Key Vulnerabilities in Industrial Control Systems (ICS / АСУ ТП / ӨБАЖ): August–September 2025
In recent months, leading global companies producing equipment for industrial automation systems — Siemens, Rockwell Automation, Schneider Electric, ABB, and others — have reported new critical vulnerabilities in their products.
Controllers (PLCs), SCADA/HMI systems, engineering stations, network modules, and other equipment used in industrial and infrastructure facilities are at risk.
Why this matters for Kazakhstan
These solutions are widely used in Kazakhstan — in the oil and gas, energy, transport, utilities, financial sector, and even healthcare.
If these vulnerabilities are exploited by attackers, it could lead to production downtime, power outages, or disruption of urban infrastructure.
This material is prepared for cybersecurity professionals and helps prioritize vulnerability remediation. Specific applicability depends on the versions of hardware and software used at facilities.
Key developments from major vendors
Siemens
In August and September, the company released nearly 30 security updates. The most critical include:
-
CVE-2025-40804 (CVSS 9.3) — a vulnerability in SIMATIC Virtualization as a Service. Allows an attacker to access or modify confidential data without authorization.
-
CVE-2025-40746, CVE-2025-40751 — issues in SIMATIC RTLS Locating Manager enabling execution of arbitrary code with administrative privileges.
-
Vulnerabilities in UMC, Simotion, Industrial Edge, and Sinamics were also fixed, which could allow remote code execution (RCE) or denial of service (DoS).
Risks: unauthorized access to engineering stations, PCS7 and WinCC failures, and manipulation of controller configurations.
Schneider Electric
Four critical vulnerabilities were found in EcoStruxure Power Monitoring Expert, Power Operation, and Power SCADA Operation, allowing potential remote code execution or data leakage, which is especially dangerous for energy systems.
In Modicon M340 controllers and communication modules, issues that could cause device failure via malicious FTP commands were fixed.
Vulnerabilities in Software Update allowing privilege escalation or file corruption were also corrected.
Risks: distorted monitoring and control data, and potential preparation for attacks on critical infrastructure.
Rockwell Automation
-
CVE-2025-7353 (CVSS 9.3) — critical vulnerability in ControlLogix Ethernet modules, allowing full device control.
-
CVE-2025-9364 — in FactoryTalk Analytics LogixAI, a Redis database misconfiguration could lead to data leakage and privilege escalation.
-
CVE-2025-9161 — in FactoryTalk Optix, malicious plugins could be uploaded and executed via MQTT.
Risks: full controller compromise, SCADA system failures, and analytics platform compromise.
ABB
Critical vulnerabilities were found in ASPECT, Nexus, and Matrix, including authentication bypass and remote code execution (RCE) without authorization.
Some of these have CVSS scores up to 9.8, making them extremely dangerous. ABB recommends updating to version 3.08.04-s01 or higher or isolating vulnerable systems from the network.
Risks: remote takeover of industrial systems and compromise of critical operations.
Overall analysis
In recent months, there has been an increase in complex attacks where multiple vulnerabilities are exploited simultaneously.
A purely reactive approach — applying updates only after incidents — is no longer sufficient.
A shift toward a resilient architecture is required, which includes:
-
Inventory of all assets and their vulnerabilities;
-
Network segmentation according to the Purdue model;
-
Implementation of Zero Trust principles;
-
Continuous monitoring and integrity checks of systems.
Practical recommendations
1. Patch and update management
-
Maintain an inventory of devices and their vulnerabilities.
-
Evaluate how updates will affect the production process before deployment.
-
Test patches in isolated environments.
-
If updates are not possible, use virtual patching and disable unused services (FTP, Redis, web-debug).
-
Regularly monitor vendor security advisories.
2. Network segmentation
-
Segment networks by levels: corporate, DMZ, SCADA, controllers, and field devices.
-
Eliminate direct Internet access.
-
Use jump servers and data diodes for secure data transfer.
-
Implement multi-factor authentication and minimum privileges.
-
Restrict protocols and ports to only those necessary (CIP, Modbus, Profinet, etc.).
3. Monitoring and threat detection
-
Deploy specialized OT network monitoring.
-
Integrate data with SOC/SIEM.
-
Monitor PLC and SCADA configuration integrity.
-
Use Threat Intelligence to detect new attacks.
-
Set up anomaly detection — e.g., suspicious FTP commands or unauthorized Redis access.
4. Incident response and training
-
Update response plans for DoS, PLC compromise, etc.
-
Conduct realistic drills and tabletop exercises.
-
Train personnel to recognize phishing and intrusion indicators.
-
Analyze every incident to continuously improve defenses.
5. Legacy systems management
-
Implement application whitelisting on engineering stations and servers.
-
Block unauthorized USB devices.
-
Strictly control remote connections.
-
Isolate legacy systems where updates are not possible.