Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Experts Identify Multiple Vulnerabilities in ICONICS SCADA Systems
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Technology

Experts Identify Multiple Vulnerabilities in ICONICS SCADA Systems

Highlights

  • Multiple vulnerabilities found in ICONICS SCADA software.

  • Critical sectors like energy and manufacturing are affected.

  • Organizations must apply patches to secure their systems.

Kaan Demirel
Last updated: 10 March, 2025 - 11:19 pm 11:19 pm
Kaan Demirel 2 months ago
Share
SHARE

Critical infrastructure worldwide may be at risk as several vulnerabilities have been uncovered in ICONICS’ SCADA software. These security flaws could allow unauthorized access and manipulation of essential systems. With ICONICS software embedded in numerous industries across over 100 countries, the potential impact is significant.

Contents
Details of Identified VulnerabilitiesImpact on Critical InfrastructureRemaining Risks and Recommendations

Historically, ICONICS has been recognized for its reliable SCADA solutions used by major corporations and governments. However, recent discoveries by cybersecurity firms indicate that despite previous assurances, some vulnerabilities have persisted or emerged in newer versions of the software.

Details of Identified Vulnerabilities

The vulnerabilities, affecting versions 10.97.2 and 10.97.3, include privilege escalation, DLL hijacking, and the ability to modify critical files. According to researchers Asher Davila and Malav Vyas,

“On unpatched ICONICS installations without any workarounds or remediations, these vulnerabilities could lead to escalation of privileges, denial of service, and in specific circumstances, even full system compromise.”

Each vulnerability rates between 7 and 7.8 on the CVSS severity scale, highlighting the urgency for immediate remediation.

Impact on Critical Infrastructure

ICONICS’ SCADA servers are predominantly utilized in sectors such as government, military, manufacturing, and energy. The software’s role in automation and data analysis makes these vulnerabilities particularly concerning for facilities including power plants, airports, and natural gas plants. Business intelligence data reveals that major companies like Amazon, IBM, and Hewlett-Packard rely on ICONICS, underscoring the widespread nature of the potential threat.

Remaining Risks and Recommendations

Despite patches being released, scans have detected numerous ICONICS servers still exposed to the internet without updates. The continued presence of these vulnerabilities poses ongoing risks of unauthorized access and system disruptions. It is imperative for organizations using ICONICS software to ensure all patches are applied and to secure their servers against potential exploitation.

Addressing these vulnerabilities is crucial for maintaining the integrity and security of critical infrastructure systems. Organizations should prioritize updating their ICONICS software and implement additional security measures to mitigate potential threats. Vigilance and prompt action are essential to prevent possible disruptions and breaches in essential services.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

CrowdStrike Faces Workforce Reduction Amid Financial Shifts

Uber Navigates Tariffs While Preparing for Growth

WhatsApp Wins $168M Spyware Victory Against NSO Group

Google Targets Vulnerabilities in May Security Update

SpaceX’s Starbase Becomes an Official City in Texas

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Warzone Brings Back Verdansk, Faces Cheating Concerns
Next Article Split Fiction Achieves Million-Sale Milestone in Just Two Days

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Orbbec Debuts Gemini 435Le for Enhanced Industrial 3D Vision
Robotics
Tesla Drives Toward $1 Trillion Valuation With Tariff Rollback
Electric Vehicle
China and Tesla Compete in Humanoid Robot Development
Electric Vehicle
FTC Delays Enforcement of Subscription Cancellation Rule
Gaming
Master Your Wordle Strategy with Expert Tips
Gaming
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?