<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.fortress-cybersecurity.fr/blogs/author/amine/feed" rel="self" type="application/rss+xml"/><title>Site Institutionnel - Blog by Amine</title><description>Site Institutionnel - Blog by Amine</description><link>https://www.fortress-cybersecurity.fr/blogs/author/amine</link><lastBuildDate>Mon, 11 May 2026 05:59:46 +0200</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S19]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s19</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/> Lotus Wiper : une nouvelle menace visant le secteur de l'énergie au Venezuela Kaspersky analyse Lotus Wiper, un malware destructeur ciblant le secteu ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><b></b></div>
</div></div><span><span><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><b></b></div>
</div></div><p><strong><span>Lotus Wiper : une nouvelle menace visant le secteur de l'énergie au Venezuela</span></strong><br/></p><p><span><span><span>Kaspersky analyse Lotus Wiper, un malware destructeur ciblant le secteur énergie/utilities au Venezuela fin 2025, dans un contexte de tensions géopolitiques dans la région des Caraïbes. À la différence d’un ransomware, l’attaque ne vise pas l’extorsion mais l’effacement pur des systèmes : modification aléatoire des mots de passe utilisateurs, désactivation des comptes locaux et des interfaces réseau, suppression des points de restauration, écrasement des disques, effacement des journaux et suppression massive de fichiers. À l’image de NotPetya ou d’HermeticWiper, Lotus Wiper rappelle que toutes les attaques destructrices ne poursuivent pas un objectif financier : certaines s’inscrivent dans des logiques géopolitiques où la finalité est la destruction des systèmes et la perturbation durable de l’activité.</span></span><br/></span></p><p><a href="https://securelist.com/tr/lotus-wiper/119472/" title="https://securelist.com/tr/lotus-wiper/119472/" rel="">https://securelist.com/tr/lotus-wiper/119472/</a><br/></p><p><span><br/></span></p><p><strong><span>NIST/NCCoE : mieux voir l’OT pour mieux le protéger</span></strong><br/></p><p><span><span><span></span></span></span></p><div><p></p></div></span></span><p></p><div><p>Dans cet article de GovConWire, la nouvelle initiative du NIST/NCCoE, un organisme américain de référence en cybersécurité et son centre chargé de produire des guides pratiques, met l'accent sur la visibilité dans les environnements industriels. L’idée est simple : dans beaucoup de ces environnements, on ne sait pas toujours précisément quels équipements sont présents, comment ils communiquent, ni si une activité anormale est en cours. L’article montre que ce manque de visibilité n’est pas seulement un problème technique. Il peut avoir des impacts directs sur la production, la sécurité des sites, la conformité et la résilience des infrastructures critiques.</p></div><p><a href="https://www.govconwire.com/articles/chuck-brooks-govcon-expert-nist-cybersecurity-visibility-project" title="https://www.govconwire.com/articles/chuck-brooks-govcon-expert-nist-cybersecurity-visibility-project" rel="">https://www.govconwire.com/articles/chuck-brooks-govcon-expert-nist-cybersecurity-visibility-project</a><br/></p><p></p><p><br/></p><p><strong><span>Mythos / Project Glasswing : les environnements industriels encore trop peu intégrés</span></strong></p><p>Dans cet article de Nextgov/FCW, on parle de Mythos, le modèle cyber d’Anthropic, utilisé dans Project Glasswing pour aider à identifier et corriger des vulnérabilités logicielles.<span><span></span></span></p><div><p>L’article explique que plusieurs acteurs du monde industriel estiment avoir été écartés au départ, alors que leurs infrastructures sont directement exposées à ce type de risque. Il rappelle aussi que corriger une faille sur un site industriel est souvent plus complexe que dans un environnement informatique classique : certains équipements sont anciens, difficiles à arrêter, et les mises à jour doivent être priorisées avec attention.</p></div><p></p><p><a href="https://www.nextgov.com/cybersecurity/2026/05/operational-technology-providers-are-feeling-annoyance-exclusion-anthropics-mythos-rollout-sources-say/413309/" title="https://www.nextgov.com/cybersecurity/2026/05/operational-technology-providers-are-feeling-annoyance-exclusion-anthropics-mythos-rollout-sources-say/413309/" rel="">https://www.nextgov.com/cybersecurity/2026/05/operational-technology-providers-are-feeling-annoyance-exclusion-anthropics-mythos-rollout-sources-say/413309/</a><br/></p><p><br/></p><div><p></p><div><div><p><span style="font-weight:bold;"><span>Vulnerability Corner :</span></span><span>&nbsp;</span></p></div><div><p><span>Liste des Known Exploited Vulnerabilities (KEV) publiés par l'agence de cybersécurité américaine CISA la semaine dernière :&nbsp;&nbsp;</span></p></div><div><div><table border="1"><tbody><tr><td style="vertical-align:top;width:192px;" class="zp-selected-cell"><div><div><p><span style="font-weight:bold;">CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:199.25px;"><div><div><p><span style="font-weight:bold;">Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:277.047px;"><div><div><p><span style="font-weight:bold;">Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:608.953px;"><div><div><p><span style="font-weight:bold;">Liens&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:192px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-0300" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-0300</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:199.25px;"><div><div><p><span>Palo Alto Networks&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:277.047px;"><div><div><p><span>PAN-OS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:608.953px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-0300%2C%20https%3A//security.paloaltonetworks.com/CVE-2026-0300" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>https://nvd.nist.gov/vuln/detail/CVE-2026-0300, https://security.paloaltonetworks.com/CVE-2026-0300</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:192px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-42208" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-42208</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:199.25px;"><div><div><p><span>BerriAI&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:277.047px;"><div><div><p><span>LiteLLM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:608.953px;"><div><div><p><span></span><a href="https://github.com/BerriAI/litellm/security/advisories/GHSA-r75f-5x8p-qvmc%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-42208" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>https://github.com/BerriAI/litellm/security/advisories/GHSA-r75f-5x8p-qvmc, https://nvd.nist.gov/vuln/detail/CVE-2026-42208</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:192px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-6973" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-6973</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:199.25px;"><div><div><p><span>Ivanti&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:277.047px;"><div><div><p><span>Endpoint Manager Mobile (EPMM)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:608.953px;"><div><div><p><span></span><a href="https://hub.ivanti.com/s/article/May-2026-Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-Multiple-CVEs?language=en_US%2C%20https%3A%2F%2Fnvd.nist.gov%2Fvuln%2Fdetail%2FCVE-2026-6973" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>https://hub.ivanti.com/s/article/May-2026-Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-Multiple-CVEs?language=en_US, https://nvd.nist.gov/vuln/detail/CVE-2026-6973</span></span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p><span>&nbsp;</span></p></div><div><p><span style="font-weight:bold;"><span>Vulnérabilités de composants de systèmes industriels :&nbsp;</span></span><span>&nbsp;</span></p></div><div><p><span>Source : ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div><div><div><table border="1"><tbody><tr><td style="vertical-align:top;width:82px;"><div><div><p><span style="font-weight:bold;">Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span style="font-weight:bold;">Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span style="font-weight:bold;">Critical&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span style="font-weight:bold;">High&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span style="font-weight:bold;">Medium&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span style="font-weight:bold;">Low&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span style="font-weight:bold;">Total&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Johnson Controls Inc.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>CEM AC2000&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;" class="zp-selected-cell"><div><div><p><span>MAXHUB&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>MAXHUB Pivot client application&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p><span>&nbsp;</span></p></div><div><p><span>&nbsp;</span></p></div><div><p><span>Liste complète triée par CVSSv3 Score :&nbsp;</span></p></div><div><div><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;" class="zp-selected-cell"><div><div><p><span style="font-weight:bold;">Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span style="font-weight:bold;">Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span style="font-weight:bold;">CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span style="font-weight:bold;">CVSSv3 Score&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span style="font-weight:bold;">CVSSv3 Severity&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span style="font-weight:bold;">EPSS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span style="font-weight:bold;">Percentile&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span style="font-weight:bold;">CWE&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Johnson Controls Inc.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CEM AC2000&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21661" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-21661</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.7&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.014%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.463%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/427.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-427</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>MAXHUB&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MAXHUB Pivot client application&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-6411" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-6411</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/327.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-327</span></span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p><span>&nbsp;</span></p></div><div><p><span>-----&nbsp;<br/></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br/>&nbsp;</span></p></div><div><p><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-d-avril-2026" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois d'avril 2026</span></a><span>&nbsp;</span></p></div><div><p><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div><div><p><span>- 4 juin 2026 : Gérer les incidents cyber en environnement industriel​, inscription </span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p><span>- 2 juillet 2026 : Gérer les vulnérabilités en environnement industriel​​, inscription </span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p><span>- 3 septembre 2026 : Mettre en place le plan de contrôle cyber de ses installations industriels​​, inscription </span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p><span>- 1 octobre 2026 : Sécuriser les accès à distance et de télémaintenance des actifs industriels, inscription </span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p><span>- 5 novembre 2026 : Protéger les endpoints dans les zones industrielles, inscription </span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p><span>- 3 décembre 2026 : Protéger les réseaux mobiles privés 5G, inscription </span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div></div><br/><p></p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 10 May 2026 22:23:56 +0200</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S15]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s15</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Alerte CISA : Cyberattaques iraniennes contre les automates industriels Dans cet article, la CISA (Cybersecurity and Infrastructure Security Agency) al ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div><div><div><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><span style="font-weight:bold;">Alerte CISA : Cyberattaques iraniennes contre les automates industriels</span><p>Dans cet article, la CISA (Cybersecurity and Infrastructure Security Agency) alerte sur une campagne de cyberattaques menée par des pirates affiliés à l'Iran. Ces acteurs ciblent spécifiquement les automates industriels connectés à Internet afin de manipuler les systèmes de contrôle opérationnel. Ces intrusions ont déjà causé de sérieuses perturbations et d'importantes pertes financières dans plusieurs secteurs vitaux. L'objectif est de fournir des indicateurs techniques précis pour aider les entreprises à détecter d'éventuelles failles sur leurs réseaux.</p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-097a" title="https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-097a" rel="">https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-097a</a></div></div></div></div><div><p style="margin-bottom:13.3333px;"></p><div><p style="margin-bottom:13.3333px;"><br/></p></div></div></div><div><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"></div>
</div></div></div></div></div></div></div></div></div><div><div><div></div></div>
</div></div><div><div><div></div></div></div><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnerability&nbsp;Corner :</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:140.2px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:79.7375px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:267.65px;" class="zp-selected-cell"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:816.35px;"><div><div><p><span>Liens&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:140.2px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1340" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1340</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:79.7375px;"><div><div><p><span>Ivanti&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:267.65px;"><div><div><p><span>Endpoint Manager Mobile (EPMM)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:816.35px;"><div><div><p><span></span><a href="https://hub.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US%2C%20https%3A%2F%2Fnvd.nist.gov%2Fvuln%2Fdetail%2FCVE-2026-1340%2C%20https%3A%2F%2Fsupport.mobileiron.com%2Fmi%2Fvsp%2FAB1786671%2Fivanti-security-update-1761642-1.1.0L-5.noarch.rpm%2C%20https%3A%2F%2Fsupport.mobileiron.com%2Fmi%2Fvsp%2FAB1786671%2Fivanti-security-update-1761642-1.1.0S-5.noarch.rpm" target="_blank" rel="noreferrer noopener"><span>https://hub.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US, https://nvd.nist.gov/vuln/detail/CVE-2026-1340, https://support.mobileiron.com/mi/vsp/AB1786671/ivanti-security-update-1761642-1.1.0L-5.noarch.rpm, https://support.mobileiron.com/mi/vsp/AB1786671/ivanti-security-update-1761642-1.1.0S-5.noarch.rpm</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:140.2px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-35616" target="_blank" rel="noreferrer noopener"><span>CVE-2026-35616</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:79.7375px;"><div><div><p><span>Fortinet&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:267.65px;"><div><div><p><span>FortiClient EMS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:816.35px;"><div><div><p><span></span><a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-099%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-35616" target="_blank" rel="noreferrer noopener"><span>https://fortiguard.fortinet.com/psirt/FG-IR-26-099, https://nvd.nist.gov/vuln/detail/CVE-2026-35616</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Critical&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>High&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Medium&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Low&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Total&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Mitsubishi Electric&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>GENESIS64&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>2&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Contemporary Controls Sedona Alliance&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>BASControl20&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>GPL&nbsp;Odorizers&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>GPL750 (XL4)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Score&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Severity&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EPSS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Percentile&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CWE&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Contemporary Controls Sedona Alliance&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>BASControl20&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13926" target="_blank" rel="noreferrer noopener"><span>CVE-2025-13926</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/807.html" target="_blank" rel="noreferrer noopener"><span>CWE-807</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Mitsubishi Electric&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>GENESIS64&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14815" target="_blank" rel="noreferrer noopener"><span>CVE-2025-14815</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.998%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/312.html" target="_blank" rel="noreferrer noopener"><span>CWE-312</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Mitsubishi Electric&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>GENESIS64&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14816" target="_blank" rel="noreferrer noopener"><span>CVE-2025-14816</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.998%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/317.html" target="_blank" rel="noreferrer noopener"><span>CWE-317</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>GPL&nbsp;Odorizers&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>GPL750 (XL4)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-4436" target="_blank" rel="noreferrer noopener"><span>CVE-2026-4436</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br/></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br/>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-mars-2027" title="- Bilan des Known Exploited Vulnerabilities du mois de mars 2026&nbsp;" target="_blank" rel="">- Bilan des Known Exploited Vulnerabilities du mois de mars 202</a><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-mars-2027" title="- Bilan des Known Exploited Vulnerabilities du mois de mars 2026&nbsp;" target="_blank" rel="">6</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;">- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 13 Apr 2026 07:57:27 +0200</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S14]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s14</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Le plan de sauvetage de Jaguar Land Rover dans le secteur de la cybersécurité crée un précédent inquiétant&nbsp; &nbsp;selon les assureurs britanniques ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div><div><div><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><strong>Le plan de sauvetage de Jaguar Land Rover dans le secteur de la cybersécurité crée un précédent inquiétant&nbsp;<span><span><strong>&nbsp;selon les assureurs britanniques</strong></span></span></strong><p><span><span>Pour rappel, suite à la cyberattaque qu'a subi Jaguar Land Rover environ&nbsp;<span><span>5000 sous-traitants ont été indirectement impactées.</span></span>&nbsp;Le gouvernement britannique est intervenu en injectant environ 1,7 milliard d'euros sans critères clairs, cela pose une question sur l'engagement des entreprises pour améliorer leur niveau de protection contre la menace cyber. De plus, l'intervention de l'état montre aussi une limite claire des assurances. Ils peuvent assurer une entreprise mais pas les sous-traitants.</span></span></p><a href="https://www.theregister.com/2026/03/20/jlr_bailout_cmc/" title="https://www.theregister.com/2026/03/20/jlr_bailout_cmc/" rel="">https://www.theregister.com/2026/03/20/jlr_bailout_cmc/</a><br/><p><br/></p><p><span style="font-weight:700;"><strong>Guide ENISA de la sécurité dès la conception</strong></span></p><p></p>Ce guide ENISA détaille comment intégrer la sécurité dès la conception et la maintenir sur tout le cycle de vie d’un produit. Il transforme des principes comme le secure by design et by default en actions concrètes (checklists, tests, contrôles CI/CD). Surtout, il donne une méthode claire : identifier les risques critiques, appliquer des configurations sécurisées dès le déploiement, et intégrer des contrôles automatiques pour vérifier en continu que le produit reste sécurisé.<p></p><a href="https://ncca.nbu.gov.sk/data/files/240_enisa_secure_by_design_and_default_playbook_v04.pdf?csrt=9023025590583266772" rel="">https://ncca.nbu.gov.sk/data/files/240_enisa_secure_by_design_and_default_playbook_v04.pdf?csrt=9023025590583266772</a><br/></div></div></div>
<br/><div><p style="margin-bottom:13.3333px;"></p><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnerability&nbsp;Corner :</span></span><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:171px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:138.969px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:132.984px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:847.016px;"><div><div><p><span>Liens&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:171px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3055" target="_blank" rel="noreferrer noopener"><span>CVE-2026-3055</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:138.969px;"><div><div><p><span>Citrix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:132.984px;"><div><div><p><span>NetScaler&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:847.016px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3055%2C%20https%3A//support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300&amp;articleURL=NetScaler_ADC_and_NetScaler_Gateway_Security_Bulletin_for_CVE_2026_3055_and_CVE_2026_4368" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2026-3055, https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300&amp;articleURL=NetScaler_ADC_and_NetScaler_Gateway_Security_Bulletin_for_CVE_2026_3055_and_CVE_2026_4368</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:171px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3502" target="_blank" rel="noreferrer noopener"><span>CVE-2026-3502</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:138.969px;"><div><div><p><span>TrueConf&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:132.984px;"><div><div><p><span>Client&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:847.016px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3502%2C%20https%3A//trueconf.com/blog/update/trueconf-8-5%2C%20https%3A//trueconf.com/downloads/windows.html" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2026-3502, https://trueconf.com/blog/update/trueconf-8-5, https://trueconf.com/downloads/windows.html</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:171px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-5281" target="_blank" rel="noreferrer noopener"><span>CVE-2026-5281</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:138.969px;"><div><div><p><span>Google&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:132.984px;"><div><div><p><span>Dawn&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:847.016px;"><div><div><p><span></span><a href="https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-5281" target="_blank" rel="noreferrer noopener"><span>https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html, https://nvd.nist.gov/vuln/detail/CVE-2026-5281</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:206px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:534px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:111.875px;"><div><p><strong>Critical&nbsp;</strong></p></div></td><td style="vertical-align:top;width:90.5625px;"><div><p><strong>High&nbsp;</strong></p></div></td><td style="vertical-align:top;width:123.031px;"><div><p><strong>Medium&nbsp;</strong></p></div></td><td style="vertical-align:top;width:115.125px;"><div><p><strong>Low&nbsp;</strong></p></div></td><td style="vertical-align:top;width:135.828px;" class="zp-selected-cell"><div><p><strong>Total&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:206px;"><div><p>Anritsu&nbsp;</p></div></td><td style="vertical-align:top;width:534px;"><div><p>Remote Spectrum Monitor MS27100A&nbsp;</p></div></td><td style="vertical-align:top;width:111.875px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:90.5625px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:123.031px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:115.125px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:135.828px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:206px;"><div><p>PX4&nbsp;</p></div></td><td style="vertical-align:top;width:534px;"><div><p>Autopilot&nbsp;</p></div></td><td style="vertical-align:top;width:111.875px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:90.5625px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:123.031px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:115.125px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:135.828px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:206px;"><div><p>Yokogawa&nbsp;</p></div></td><td style="vertical-align:top;width:534px;"><div><p>CENTUM VP&nbsp;</p></div></td><td style="vertical-align:top;width:111.875px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:90.5625px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:123.031px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:115.125px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:135.828px;"><div><p>1&nbsp;</p></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVSSv3 Score&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVSSv3 Severity&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>EPSS&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>Percentile&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CWE&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Anritsu&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Remote Spectrum Monitor MS27100A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3356" target="_blank" rel="noreferrer noopener">CVE-2026-3356</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.054%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>17.256%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener">CWE-306</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>PX4&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Autopilot&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1579" target="_blank" rel="noreferrer noopener">CVE-2026-1579</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;" class="zp-selected-cell"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.073%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>22.206%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener">CWE-306</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Yokogawa&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CENTUM VP&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-7741" target="_blank" rel="noreferrer noopener">CVE-2025-7741</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>4.0&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.018%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>4.385%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/259.html" target="_blank" rel="noreferrer noopener">CWE-259</a>&nbsp;</p></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br/></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br/>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de décembre 2025</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a></p></div><div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div></div><br/><p></p></div><div></div><p style="margin-bottom:13.3333px;"><br/></p></div></div><div><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"></div>
</div></div></div></div></div></div></div></div></div><div><div><div></div></div>
</div></div><div><div><div></div></div></div></div></div></div></div></div></div>
</div> ]]></content:encoded><pubDate>Tue, 07 Apr 2026 07:19:51 +0200</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S11]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s11</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Cybermenaces dans l’industrie automobile L’article explique que la transformation numérique du secteur automobile (véhicules connectés, systèmes téléma ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div><div><div><div><div><div><div><p style="font-weight:bold;margin-bottom:13.3333px;"><strong><strong>Cybermenaces dans l’industrie automobile</strong></strong></p><div><p><span>L’article explique que la transformation numérique du secteur automobile (véhicules connectés, systèmes télématiques, réseaux de recharge pour véhicules électriques et chaînes d’approvisionnement digitalisées) crée de nouvelles surfaces d’attaque pour les acteurs de la menace. Il montre comment des malwares et ransomwares peuvent perturber non seulement les systèmes IT des constructeurs, mais aussi des éléments critiques comme les mises à jour logicielles des véhicules, les services connectés ou l’écosystème des véhicules électriques. Des risques concrets ont été illustrés : ralentissement des activités d’un concessionnaire à cause d’un malware, vulnérabilités liées aux mises à jour de véhicules connectés ou perturbations dans la chaîne logistique.</span></p></div><a href="https://www.bitsight.com/blog/automotive-cyber-threats-ransomware-malware-trends" title="https://www.bitsight.com/blog/automotive-cyber-threats-ransomware-malware-trends" rel="">https://www.bitsight.com/blog/automotive-cyber-threats-ransomware-malware-trends</a><br/></div></div></div></div><p></p><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span><span><span><span><span><span><span><span><span><span><strong>Rapport Cisco 2026 l'état de l'IA dans le monde industriel</strong></span></span></span><span></span></span></span></span></span></span></span></span></span></p></div>
<div><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><p style="margin-bottom:13.3333px;"><span><span>L’étude s’appuie sur des données recueillies auprès d’entreprises du monde entier, avec environ 1 000 professionnels de l’industrie interrogés. Elle montre que l’IA occupe désormais une place importante dans des processus critiques, notamment l’automatisation des processus et l’inspection automatisée de la qualité. Environ 70 % des professionnels déclarent avoir déployé de manière mature des solutions d’IA dans ces domaines. Cependant, cette adoption soulève aussi des questions d’exposition aux menaces. Le paradoxe est que, malgré ce niveau de maturité, 40 % des répondants estiment que le principal frein au déploiement reste la cybersécurité.</span></span></p><a href="https://www.cisco.com/c/dam/en/us/solutions/networking/industrial-iot/2026-state-of-industrial-ai-report.pdf" title="https://www.cisco.com/c/dam/en/us/solutions/networking/industrial-iot/2026-state-of-industrial-ai-report.pdf" rel="">https://www.cisco.com/c/dam/en/us/solutions/networking/industrial-iot/2026-state-of-industrial-ai-report.pdf</a><br/><p></p><strong><p style="margin-bottom:13.3333px;line-height:2;"></p></strong><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnerability&nbsp;Corner :</span>&nbsp;</p><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:144px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:141.25px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:202.266px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:720.734px;"><div><div><p><span>Liens&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22054" target="_blank" rel="noreferrer noopener"><span>CVE-2021-22054</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:141.25px;"><div><div><p><span>Omnissa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:202.266px;"><div><div><p><span>Workspace One UEM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:720.734px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22054%2C%20https%3A//web.archive.org/web/20211222154335/https%3A//www.vmware.com/security/advisories/VMSA-2021-0029.html" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2021-22054, https://web.archive.org/web/20211222154335/https://www.vmware.com/security/advisories/VMSA-2021-0029.html</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-26399" target="_blank" rel="noreferrer noopener"><span>CVE-2025-26399</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:141.25px;"><div><div><p><span>SolarWinds&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:202.266px;"><div><div><p><span>Web Help Desk&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:720.734px;"><div><div><p><span></span><a href="https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_12-8-7-hotfix-1_release_notes.htm%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-26399%2C%20https%3A//www.solarwinds.com/trust-center/security-advisories/cve-2025-26399" target="_blank" rel="noreferrer noopener"><span>https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_12-8-7-hotfix-1_release_notes.htm, https://nvd.nist.gov/vuln/detail/CVE-2025-26399, https://www.solarwinds.com/trust-center/security-advisories/cve-2025-26399</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68613" target="_blank" rel="noreferrer noopener"><span>CVE-2025-68613</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:141.25px;"><div><div><p><span>n8n&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:202.266px;"><div><div><p><span>n8n&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:720.734px;"><div><div><p><span></span><a href="https://github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-68613" target="_blank" rel="noreferrer noopener"><span>https://github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp, https://nvd.nist.gov/vuln/detail/CVE-2025-68613</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1603" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1603</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:141.25px;"><div><div><p><span>Ivanti&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:202.266px;"><div><div><p><span>&nbsp;Endpoint Manager (EPM)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:720.734px;"><div><div><p><span></span><a href="https://hub.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024?language=en_US%2C%20https%3A%2F%2Fnvd.nist.gov%2Fvuln%2Fdetail%2FCVE-2026-1603" target="_blank" rel="noreferrer noopener"><span>https://hub.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024?language=en_US, https://nvd.nist.gov/vuln/detail/CVE-2026-1603</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>Critical&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>High&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>Medium&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>Low&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>Total&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>Heliox Flex 180 kW EV Charging&nbsp;Station,RUGGEDCOM&nbsp;APE1808,SIDIS&nbsp;Prime,SIMATIC&nbsp;Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>13&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>13&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>29&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Lantronix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>8&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Trane&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>Tracer SC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>5&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Apeman&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>ID71&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>3&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Inductive Automation&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>Ignition Software&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Ceragon&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>MultiHaul&nbsp;MH-B100-CCS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Honeywell&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>IQ4E&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Score&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Severity&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EPSS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Percentile&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CWE&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Honeywell&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>IQ4E&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3611" target="_blank" rel="noreferrer noopener"><span>CVE-2026-3611</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>10.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Apeman&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ID71&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11126" target="_blank" rel="noreferrer noopener"><span>CVE-2025-11126</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.180%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>39.342%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67038" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67038</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.773%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67039" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67039</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.034%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.739%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/288.html" target="_blank" rel="noreferrer noopener"><span>CWE-288</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>RUGGEDCOM APE1808&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24858" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24858</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.776%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>85.865%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/288.html" target="_blank" rel="noreferrer noopener"><span>CWE-288</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIMATIC Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40943" target="_blank" rel="noreferrer noopener"><span>CVE-2025-40943</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.041%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>12.336%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer noopener"><span>CWE-79</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-7783" target="_blank" rel="noreferrer noopener"><span>CVE-2025-7783</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.7&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.177%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>38.929%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/330.html" target="_blank" rel="noreferrer noopener"><span>CWE-330</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-12816" target="_blank" rel="noreferrer noopener"><span>CVE-2025-12816</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.059%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>18.361%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/436.html" target="_blank" rel="noreferrer noopener"><span>CWE-436</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66035" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66035</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.075%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>22.465%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/201.html" target="_blank" rel="noreferrer noopener"><span>CWE-201</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Trane&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Tracer SC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28252" target="_blank" rel="noreferrer noopener"><span>CVE-2026-28252</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/327.html" target="_blank" rel="noreferrer noopener"><span>CWE-327</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66412" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66412</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.039%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>11.354%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer noopener"><span>CWE-79</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22610" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22610</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.014%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.383%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer noopener"><span>CWE-79</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-6965" target="_blank" rel="noreferrer noopener"><span>CVE-2025-6965</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.7&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.072%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>21.786%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/197.html" target="_blank" rel="noreferrer noopener"><span>CWE-197</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-29857" target="_blank" rel="noreferrer noopener"><span>CVE-2024-29857</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.337%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>56.144%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener"><span>CWE-125</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-30172" target="_blank" rel="noreferrer noopener"><span>CVE-2024-30172</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.136%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>33.229%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/20.html" target="_blank" rel="noreferrer noopener"><span>CWE-20</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41996" target="_blank" rel="noreferrer noopener"><span>CVE-2024-41996</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.430%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>62.198%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/295.html" target="_blank" rel="noreferrer noopener"><span>CWE-295</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-15284" target="_blank" rel="noreferrer noopener"><span>CVE-2025-15284</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.193%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>40.993%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/20.html" target="_blank" rel="noreferrer noopener"><span>CWE-20</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58754" target="_blank" rel="noreferrer noopener"><span>CVE-2025-58754</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.102%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>27.909%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/770.html" target="_blank" rel="noreferrer noopener"><span>CWE-770</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64756" target="_blank" rel="noreferrer noopener"><span>CVE-2025-64756</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.038%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>11.294%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66031" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66031</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.115%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>30.056%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/674.html" target="_blank" rel="noreferrer noopener"><span>CWE-674</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Trane&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Tracer SC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28253" target="_blank" rel="noreferrer noopener"><span>CVE-2026-28253</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/789.html" target="_blank" rel="noreferrer noopener"><span>CWE-789</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67034" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67034</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.773%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67035" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67035</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.773%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67036" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67036</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.773%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67037" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67037</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.773%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67041" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67041</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.044%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>13.196%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Trane&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Tracer SC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28255" target="_blank" rel="noreferrer noopener"><span>CVE-2026-28255</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/798.html" target="_blank" rel="noreferrer noopener"><span>CWE-798</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>RUGGEDCOM APE1808&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64157" target="_blank" rel="noreferrer noopener"><span>CVE-2025-64157</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.7&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.826%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/134.html" target="_blank" rel="noreferrer noopener"><span>CWE-134</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-62522" target="_blank" rel="noreferrer noopener"><span>CVE-2025-62522</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.016%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>83.540%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/22.html" target="_blank" rel="noreferrer noopener"><span>CWE-22</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Inductive Automation&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Ignition Software&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13913" target="_blank" rel="noreferrer noopener"><span>CVE-2025-13913</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/502.html" target="_blank" rel="noreferrer noopener"><span>CWE-502</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-30171" target="_blank" rel="noreferrer noopener"><span>CVE-2024-30171</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.9&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.100%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>27.724%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/203.html" target="_blank" rel="noreferrer noopener"><span>CWE-203</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9232" target="_blank" rel="noreferrer noopener"><span>CVE-2025-9232</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.9&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.033%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.182%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener"><span>CWE-125</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>RUGGEDCOM APE1808&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-55018" target="_blank" rel="noreferrer noopener"><span>CVE-2025-55018</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.053%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>16.404%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/444.html" target="_blank" rel="noreferrer noopener"><span>CWE-444</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Trane&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Tracer SC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28254" target="_blank" rel="noreferrer noopener"><span>CVE-2026-28254</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer noopener"><span>CWE-862</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Trane&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Tracer SC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28256" target="_blank" rel="noreferrer noopener"><span>CVE-2026-28256</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/547.html" target="_blank" rel="noreferrer noopener"><span>CWE-547</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9230" target="_blank" rel="noreferrer noopener"><span>CVE-2025-9230</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.031%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.655%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/787.html" target="_blank" rel="noreferrer noopener"><span>CWE-787</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Apeman&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ID71&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11852" target="_blank" rel="noreferrer noopener"><span>CVE-2025-11852</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.073%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>22.012%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Ceragon&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MultiHaul&nbsp;MH-B100-CCS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-57176" target="_blank" rel="noreferrer noopener"><span>CVE-2025-57176</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.663%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>70.878%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/434.html" target="_blank" rel="noreferrer noopener"><span>CWE-434</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64718" target="_blank" rel="noreferrer noopener"><span>CVE-2025-64718</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.020%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.992%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/1321.html" target="_blank" rel="noreferrer noopener"><span>CWE-1321</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66030" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66030</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.042%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>12.433%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/190.html" target="_blank" rel="noreferrer noopener"><span>CWE-190</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9670" target="_blank" rel="noreferrer noopener"><span>CVE-2025-9670</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.051%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>15.546%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/1333.html" target="_blank" rel="noreferrer noopener"><span>CWE-1333</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-69277" target="_blank" rel="noreferrer noopener"><span>CVE-2025-69277</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.007%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.597%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/184.html" target="_blank" rel="noreferrer noopener"><span>CWE-184</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58751" target="_blank" rel="noreferrer noopener"><span>CVE-2025-58751</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.421%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>80.382%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/22.html" target="_blank" rel="noreferrer noopener"><span>CWE-22</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58752" target="_blank" rel="noreferrer noopener"><span>CVE-2025-58752</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.016%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.513%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/23.html" target="_blank" rel="noreferrer noopener"><span>CWE-23</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>RUGGEDCOM APE1808&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-62439" target="_blank" rel="noreferrer noopener"><span>CVE-2025-62439</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.901%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/940.html" target="_blank" rel="noreferrer noopener"><span>CWE-940</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Apeman&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ID71&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11851" target="_blank" rel="noreferrer noopener"><span>CVE-2025-11851</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.052%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>16.124%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer noopener"><span>CWE-79</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-70082" target="_blank" rel="noreferrer noopener"><span>CVE-2025-70082</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.7&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.066%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>20.274%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/620.html" target="_blank" rel="noreferrer noopener"><span>CWE-620</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Heliox Flex 180 kW EV Charging Station&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-27769" target="_blank" rel="noreferrer noopener"><span>CVE-2025-27769</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.014%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.550%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/923.html" target="_blank" rel="noreferrer noopener"><span>CWE-923</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br/></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br/>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de janvier 2025</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div></div><br/><p></p></div><div><p></p></div><p></p></div><div><p></p></div><p></p></div><p></p></div><p></p></div><p></p></div><p></p></div><p></p></div></div></div></div></div><div><div><div><div><p></p></div>
</div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 13 Mar 2026 15:48:19 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S10]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s10</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>0.000 Les paiements liés aux ransomwares diminuent Les chercheurs en cybersécurité ont observés une augmentation de 50% du nombre de victimes de ransomw ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><span>0.000</span><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span></span></span></span></span><div><div><div><p style="margin-bottom:13.3333px;"></p><div><div><div><p style="font-weight:bold;margin-bottom:13.3333px;"><strong>Les paiements liés aux ransomwares diminuent</strong></p><div><p>Les chercheurs en cybersécurité ont observés une augmentation de 50% du nombre de victimes de ransomware. Pourtant les paiements liés aux ransomwares diminuent de 8%. L'article explique que les entreprises refusent de plus en plus de payer, grâce à de meilleures stratégies de réponse et de surveillance, une pression accrue des autorités contre les opérateurs de ransomware, les infrastructures et des faiblesses cryptographique qui permet au victime de décrypter les données comme avec le ransomware VolkLocker.</p></div><a href="https://www.infosecurity-magazine.com/news/ransomware-payments-decline-1/" title="https://www.infosecurity-magazine.com/news/ransomware-payments-decline-1/" rel="">https://www.infosecurity-magazine.com/news/ransomware-payments-decline-1/</a><br/></div></div></div><p></p><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span><span><span><span><span><span><span><span>Cybermenaces dans l’industrie pharmaceutique</span><span></span></span></span></span></span></span></span></span></span></p></div>
<div><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><p style="margin-bottom:13.3333px;">L’industrie pharmaceutique est une cible privilégiée des cyberattaques en raison de la valeur élevée de sa propriété intellectuelle et des données de santé sensibles qu’elle détient. Elle est exposée à plusieurs risques, comme le vol de données, les attaques de la chaîne d’approvisionnement, les erreurs humaines ou encore les vulnérabilités liées aux systèmes anciens et aux environnements cloud complexes.</p><a href="https://www.hornetsecurity.com/en/blog/cyber-threats-to-pharmaceutical-industry/" title="https://www.hornetsecurity.com/en/blog/cyber-threats-to-pharmaceutical-industry/" rel="">https://www.hornetsecurity.com/en/blog/cyber-threats-to-pharmaceutical-industry/</a><p></p><strong><p style="margin-bottom:13.3333px;line-height:2;"></p></strong><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnerability&nbsp;Corner :</span>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:152px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span>Liens&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:152px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-7921" target="_blank" rel="noreferrer noopener"><span>CVE-2017-7921</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Hikvision&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>Multiple Products&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-7921%2C%20https%3A//www.hikvision.com/us-en/support/document-center/special-notices/privilege-escalating-vulnerability-in-certain-hikvision-ip-cameras/" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2017-7921, https://www.hikvision.com/us-en/support/document-center/special-notices/privilege-escalating-vulnerability-in-certain-hikvision-ip-cameras/</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:152px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22681" target="_blank" rel="noreferrer noopener"><span>CVE-2021-22681</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Rockwell&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>Multiple Products&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22681%2C%20https%3A//support.rockwellautomation.com/app/answers/answer_view/a_id/1130301/%7E/cve-2021-22681%3A-authentication-bypass-vulnerability-found-in-logix-controllers-%2C%20https%3A//www.cisa.gov/news-events/ics-advisories/icsa-21-056-03" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2021-22681, https://support.rockwellautomation.com/app/answers/answer_view/a_id/1130301/~/cve-2021-22681%3A-authentication-bypass-vulnerability-found-in-logix-controllers-, https://www.cisa.gov/news-events/ics-advisories/icsa-21-056-03</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:152px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-30952" target="_blank" rel="noreferrer noopener"><span>CVE-2021-30952</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Apple&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>Multiple Products&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-30952%2C%20https%3A//support.apple.com/en-us/HT212975%2C%20https%3A//support.apple.com/en-us/HT212976%2C%20https%3A//support.apple.com/en-us/HT212978%2C%20https%3A//support.apple.com/en-us/HT212980%2C%20https%3A//support.apple.com/en-us/HT212982" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2021-30952, https://support.apple.com/en-us/HT212975, https://support.apple.com/en-us/HT212976, https://support.apple.com/en-us/HT212978, https://support.apple.com/en-us/HT212980, https://support.apple.com/en-us/HT212982</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:152px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-41974" target="_blank" rel="noreferrer noopener"><span>CVE-2023-41974</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Apple&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>iOS and iPadOS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-41974%2C%20https%3A//support.apple.com/en-us/HT213938%2C%20https%3A//support.apple.com/kb/HT213938" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2023-41974, https://support.apple.com/en-us/HT213938, https://support.apple.com/kb/HT213938</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:152px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-43000" target="_blank" rel="noreferrer noopener"><span>CVE-2023-43000</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Apple&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>Multiple Products&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-43000%2C%20https%3A//support.apple.com/en-us/120324%2C%20https%3A//support.apple.com/en-us/120331%2C%20https%3A//support.apple.com/en-us/120338" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2023-43000, https://support.apple.com/en-us/120324, https://support.apple.com/en-us/120331, https://support.apple.com/en-us/120338</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:152px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21385" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21385</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Qualcomm&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>Multiple Chipsets&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21385%2C%20https%3A//source.android.com/docs/security/bulletin/2026/2026-03-01" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2026-21385, https://source.android.com/docs/security/bulletin/2026/2026-03-01</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:152px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22719" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22719</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Broadcom&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>VMware Aria Operations&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span></span><a href="https://knowledge.broadcom.com/external/article/430349%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-22719%2C%20https%3A//support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947" target="_blank" rel="noreferrer noopener"><span>https://knowledge.broadcom.com/external/article/430349, https://nvd.nist.gov/vuln/detail/CVE-2026-22719, https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"></p><table border="1"><tbody><tr><td style="vertical-align:top;width:216px;"><p><strong>Vendor&nbsp;</strong></p></td><td style="vertical-align:top;width:522px;"><p><strong>Product&nbsp;</strong></p></td><td style="vertical-align:top;width:125.547px;"><p><strong>Critical&nbsp;</strong></p></td><td style="vertical-align:top;width:110.422px;"><p><strong>High&nbsp;</strong></p></td><td style="vertical-align:top;width:120.938px;"><p><strong>Medium&nbsp;</strong></p></td><td style="vertical-align:top;width:131px;"><p><strong>Low&nbsp;</strong></p></td><td style="vertical-align:top;width:91px;"><p><strong>Total&nbsp;</strong></p></td></tr><tr><td style="width:216px;"> <span>Mobiliti</span></td><td style="width:522px;"> <span>Mobiliti e-mobi.hu</span></td><td style="width:125.547px;"> 1</td><td style="width:110.422px;">2</td><td style="width:120.938px;">1</td><td style="width:131px;">0</td><td style="width:91px;">4</td></tr><tr><td style="width:216px;"> <span> Everon</span></td><td style="width:522px;"> <span><span> Everon OCPP Backends</span></span></td><td style="width:125.547px;"> 1</td><td style="width:110.422px;">2</td><td style="width:120.938px;">1</td><td style="width:131px;">0</td><td style="width:91px;">4</td></tr><tr><td style="width:216px;"><span><span>ePower</span></span></td><td style="width:522px;"><span>ePower epower.ie</span></td><td style="width:125.547px;">1</td><td style="width:110.422px;">2</td><td style="width:120.938px;">1</td><td style="width:131px;">0</td><td style="width:91px;">4</td></tr><tr><td style="width:216px;"> <span><span>Labkotec</span></span></td><td style="width:522px;"> <span>Labkotec LID-3300IP</span></td><td style="width:125.547px;"> 1</td><td style="width:110.422px;">0</td><td style="width:120.938px;">0</td><td style="width:131px;">0</td><td style="width:91px;">1</td></tr><tr><td style="width:216px;"> <span>Hitachi Energy</span></td><td style="width:522px;"> <span> RTU500 series CMU Firmware version 12.7.1 through 12.7.7, RTU500 series CMU Firmware version 13.5.1 through 13.5.4, RTU500 series CMU Firmware version 13.6.1 through 13.6.2, RTU500 series CMU Firmware version 13.7.1 through 13.7.7, RTU500 series CMU Firmware version 13.8.1</span></td><td style="width:125.547px;">0</td><td style="width:110.422px;">3</td><td style="width:120.938px;">1</td><td style="width:131px;"> 0</td><td style="width:91px;"> 4</td></tr><tr><td style="width:216px;"> <span><span>Mitsubishi Electric</span></span></td><td style="width:522px;"><span><span>Mitsubishi Electric MELSEC iQ-F Series EtherNet/IP module and Ethernet module</span></span> </td><td style="width:125.547px;"> 0</td><td style="width:110.422px;">3</td><td style="width:120.938px;">0</td><td style="width:131px;">0</td><td style="width:91px;">1</td></tr><tr><td style="width:216px;"> <span>Portwell</span></td><td style="width:522px;"> <span><span> Portwell Engineering Toolkits</span></span></td><td style="width:125.547px;"> 0</td><td style="width:110.422px;">1</td><td style="width:120.938px;">0</td><td style="width:131px;">0</td><td style="width:91px;">1</td></tr><tr><td style="width:216px;"><span>Delta Electronics</span></td><td style="width:522px;"> <span>Delta Electronics CNCSoft-G2</span></td><td style="width:125.547px;"> 0</td><td style="width:110.422px;">1</td><td style="width:120.938px;">0</td><td style="width:131px;">0</td><td style="width:91px;">1</td></tr><tr><td style="vertical-align:top;width:216px;"><p>Delta Electronics&nbsp;</p></td><td style="vertical-align:top;width:522px;"><p>EVMAPA&nbsp;</p></td><td style="vertical-align:top;width:125.547px;"><p>0</p></td><td style="vertical-align:top;width:110.422px;"><p>1</p></td><td style="vertical-align:top;width:120.938px;"><p>0&nbsp;</p></td><td style="vertical-align:top;width:131px;"><p>0&nbsp;</p></td><td style="vertical-align:top;width:91px;"><p>1</p></td></tr><tr><td style="vertical-align:top;width:216px;"><p><span><span> Hitachi Energy</span></span><br/></p></td><td style="vertical-align:top;width:522px;"><span><span>CVE-2026-2460</span></span><br/></td><td style="vertical-align:top;width:125.547px;">0</td><td style="vertical-align:top;width:110.422px;">0</td><td style="vertical-align:top;width:120.938px;">2</td><td style="vertical-align:top;width:131px;">0</td><td style="vertical-align:top;width:91px;">2</td></tr></tbody></table><p></p></div><div><p style="margin-bottom:13.3333px;"><br/></p><p style="margin-bottom:13.3333px;">Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"><span></span></p><div><table border="1"><tbody><tr><td style="vertical-align:top;width:174px;"><p><strong>Vendor&nbsp;</strong></p></td><td style="vertical-align:top;width:476px;"><p><strong>Product&nbsp;</strong></p></td><td style="vertical-align:top;width:159.094px;"><p><strong>CVE&nbsp;</strong></p></td><td style="vertical-align:top;width:98.3594px;"><p><strong>CVSSv3 Score&nbsp;</strong></p></td><td style="vertical-align:top;width:99.9375px;"><p><strong>CVSSv3 Severity&nbsp;</strong></p></td><td style="vertical-align:top;width:99.8125px;"><p><strong>EPSS&nbsp;</strong></p></td><td style="vertical-align:top;width:105.297px;"><p><strong>Percentile&nbsp;</strong></p></td><td style="vertical-align:top;width:100.328px;"><p><strong>CWE&nbsp;</strong></p></td></tr><tr><td style="vertical-align:top;width:174px;"><p>Delta Electronics&nbsp;</p></td><td style="vertical-align:top;width:476px;"><p>EVMAPA&nbsp;</p></td><td style="vertical-align:top;width:159.094px;"><p>CVE-2026-3094<br/></p></td><td style="vertical-align:top;width:98.3594px;"><p>7.8</p></td><td style="vertical-align:top;width:99.9375px;"><p>HIGH&nbsp;</p></td><td style="vertical-align:top;width:99.8125px;"><p>0.0</p></td><td style="vertical-align:top;width:105.297px;"><p></p><div><pre>0.029</pre></div><p></p></td><td style="vertical-align:top;width:100.328px;"><p>CWE-787<br/></p></td></tr><tr><td style="vertical-align:top;width:174px;"><p>Mitsubishi Electric<br/></p></td><td style="vertical-align:top;width:476px;">Mitsubishi Electric MELSEC iQ-F Series EtherNet/IP module and Ethernet module</td><td style="vertical-align:top;width:159.094px;"><div>CVE-2026-1874</div></td><td style="vertical-align:top;width:98.3594px;">7.5</td><td style="vertical-align:top;width:99.9375px;">HIGH</td><td style="vertical-align:top;width:99.8125px;">0.001 </td><td style="vertical-align:top;width:105.297px;"> 0.338</td><td style="vertical-align:top;width:100.328px;">CWE-670</td></tr><tr><td style="width:174px;">Mitsubishi Electric </td><td style="width:476px;"> Mitsubishi Electric MELSEC iQ-F Series EtherNet/IP module and Ethernet module</td><td style="width:159.094px;"> CVE-2026-1875</td><td style="width:98.3594px;"> 7.5</td><td style="width:99.9375px;"> HIGH</td><td style="width:99.8125px;">0.001<br/></td><td style="width:105.297px;">0.338<br/></td><td style="width:100.328px;">CWE-404 </td></tr><tr><td style="width:174px;"> Mitsubishi Electric</td><td style="width:476px;"> Mitsubishi Electric MELSEC iQ-F Series EtherNet/IP module and Ethernet module</td><td style="width:159.094px;"> CVE-2026-1876</td><td style="width:98.3594px;"> 7.5</td><td style="width:99.9375px;"> HIGH</td><td style="width:99.8125px;"><span><span>0.001</span></span> </td><td style="width:105.297px;"> <span><span>0.338</span></span></td><td style="width:100.328px;">CWE-404  </td></tr><tr><td style="width:174px;"> <span>Hitachi Energy</span></td><td style="width:476px;"> <span>Hitachi Energy Relion REB500 Product</span></td><td style="width:159.094px;"> <span>CVE-2026-2459</span></td><td style="width:98.3594px;"> <span><span>6.5</span></span></td><td style="width:99.9375px;"> Medium</td><td style="width:99.8125px;"> <span>0.000</span></td><td style="width:105.297px;"> <span>0.0845</span></td><td style="width:100.328px;"> <span>CWE-267</span></td></tr><tr><td style="width:174px;"> <span>Hitachi Energy</span></td><td style="width:476px;"> <span>Hitachi Energy Relion REB500 Product</span></td><td style="width:159.094px;"> <span>CVE-2026-2460</span></td><td style="width:98.3594px;"> <span><span>6.5</span></span></td><td style="width:99.9375px;"> <span><span>Medium</span></span></td><td style="width:99.8125px;"> <span>0.000</span></td><td style="width:105.297px;"> <span>0.0845</span></td><td style="width:100.328px;"> <span>CWE-267</span></td></tr><tr><td style="width:174px;"> <span><span>Hitachi Energy</span></span></td><td style="width:476px;"> <span><span>RTU500 series CMU Firmware version 12.7.1 through 12.7.7, RTU500 series CMU Firmware version 13.5.1 through 13.5.4, RTU500 series CMU Firmware version 13.6.1 through 13.6.2, RTU500 series CMU Firmware version 13.7.1 through 13.7.7, RTU500 series CMU Firmware version 13.8.1</span></span></td><td style="width:159.094px;"><div><div>CVE-2026-1772</div></div></td><td style="width:98.3594px;"> <span><span>4.3</span></span></td><td style="width:99.9375px;"> <span><span>Medium</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span>0.155</span></td><td style="width:100.328px;"> <span>&nbsp;CWE-280</span></td></tr><tr><td style="width:174px;"> <span><span>Hitachi Energy</span></span></td><td style="width:476px;"> <span>RTU500 series CMU Firmware version 12.7.1 through 12.7.7, RTU500 series CMU Firmware version 13.5.1 through 13.5.4, RTU500 series CMU Firmware version 13.6.1 through 13.6.2, RTU500 series CMU Firmware version 13.7.1 through 13.7.7, RTU500 series CMU Firmware version 13.8.1</span></td><td style="width:159.094px;"><div><div>CVE-2026-1773</div></div></td><td style="width:98.3594px;">7.5 </td><td style="width:99.9375px;"> High</td><td style="width:99.8125px;"><span><span> 0.000</span></span> </td><td style="width:105.297px;"> <span>0.219</span></td><td style="width:100.328px;"><span>CWE-184</span> </td></tr><tr><td style="width:174px;"> <span><span>Hitachi Energy</span></span></td><td style="width:476px;"> <span>RTU500 series CMU Firmware version 12.7.1 through 12.7.7, RTU500 series CMU Firmware version 13.5.1 through 13.5.4, RTU500 series CMU Firmware version 13.6.1 through 13.6.2, RTU500 series CMU Firmware version 13.7.1 through 13.7.7, RTU500 series CMU Firmware version 13.8.1</span></td><td style="width:159.094px;"><div><div><span style="font-family:inherit;font-size:inherit;">CVE-2024-8176</span></div></div></td><td style="width:98.3594px;"> <span><span>7.5</span></span></td><td style="width:99.9375px;"><span><span>High</span></span> </td><td style="width:99.8125px;"> <span><span> <span>0.004</span></span></span></td><td style="width:105.297px;"> <span>0.613</span></td><td style="width:100.328px;"> <span>CWE-674</span></td></tr><tr><td style="width:174px;"> <span><span>Hitachi Energy</span></span></td><td style="width:476px;"> <span>RTU500 series CMU Firmware version 12.7.1 through 12.7.7, RTU500 series CMU Firmware version 13.5.1 through 13.5.4, RTU500 series CMU Firmware version 13.6.1 through 13.6.2, RTU500 series CMU Firmware version 13.7.1 through 13.7.7, RTU500 series CMU Firmware version 13.8.1</span></td><td style="width:159.094px;"> CVE-2025-59375</td><td style="width:98.3594px;"><span><span>7.5</span></span> </td><td style="width:99.9375px;"> <span><span>High</span></span></td><td style="width:99.8125px;"><span><span> 0.000</span></span> </td><td style="width:105.297px;"> <span>0.155</span></td><td style="width:100.328px;"> <span>CWE-770</span></td></tr><tr><td style="width:174px;"> <span>Portwell</span></td><td style="width:476px;"> <span>Portwell Engineering Toolkits</span></td><td style="width:159.094px;"> <span>CVE-2026-3437</span></td><td style="width:98.3594px;">8.8</td><td style="width:99.9375px;">High</td><td style="width:99.8125px;"> <span><span> 0.000 </span></span></td><td style="width:105.297px;"> <span>0.0258</span></td><td style="width:100.328px;"> <span>CWE-119</span></td></tr><tr><td style="width:174px;"> <span>Labkotec</span></td><td style="width:476px;"> <span>Labkotec LID-3300IP</span></td><td style="width:159.094px;"> <span>CVE-2026-1775</span></td><td style="width:98.3594px;"> <span>9.4</span></td><td style="width:99.9375px;"> Critical</td><td style="width:99.8125px;"> <span><span>  0.000</span></span></td><td style="width:105.297px;"><span>0.026</span> </td><td style="width:100.328px;"> <span>CWE-306</span></td></tr><tr><td style="width:174px;"> <span>Mobiliti</span></td><td style="width:476px;"> <span>Mobiliti e-mobi.hu</span></td><td style="width:159.094px;"><div><div>CVE-2026-26051</div></div></td><td style="width:98.3594px;"> <span>9.4</span></td><td style="width:99.9375px;"> <span>Critical</span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span>0.275</span></td><td style="width:100.328px;"><span>&nbsp;<span><span> CWE-306</span></span></span></td></tr><tr style="height:46.3281px;"><td style="width:174px;"> <span><span>Mobiliti</span></span></td><td style="width:476px;"> <span><span>Mobiliti e-mobi.hu</span></span></td><td style="width:159.094px;"> CVE-2026-20882<div><div></div></div></td><td style="width:98.3594px;"> 7.5</td><td style="width:99.9375px;">High</td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span>0.176</span></td><td style="width:100.328px;"> <span><span> CWE-307</span></span></td></tr><tr><td style="width:174px;"> <span><span>Mobiliti</span></span></td><td style="width:476px;"> <span><span>Mobiliti e-mobi.hu</span></span></td><td style="width:159.094px;"> CVE-2026-27764</td><td style="width:98.3594px;"> 7.3</td><td style="width:99.9375px;"> <span><span>High</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span>0.102</span></td><td style="width:100.328px;"> <span> CWE-613</span></td></tr><tr><td style="width:174px;"> <span><span>Mobiliti</span></span></td><td style="width:476px;"> <span><span>Mobiliti e-mobi.hu</span></span></td><td style="width:159.094px;"><div><div><span style="font-family:inherit;font-size:inherit;">CVE-2026-27777</span></div></div></td><td style="width:98.3594px;"> 6.5</td><td style="width:99.9375px;">Medium</td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span>0.128</span></td><td style="width:100.328px;"> <span>CWE-522</span></td></tr><tr><td style="width:174px;"><span>ePower</span></td><td style="width:476px;"> <span>ePower epower.ie</span></td><td style="width:159.094px;"> CVE-2026-22552</td><td style="width:98.3594px;"> <span><span> 9.4</span></span></td><td style="width:99.9375px;"> <span><span>Critical</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span> 0.275</span></span></td><td style="width:100.328px;"> <span>CWE-306</span></td></tr><tr><td style="width:174px;"> <span>ePower</span></td><td style="width:476px;"> <span>ePower epower.ie</span></td><td style="width:159.094px;"><div><div><span style="font-family:inherit;font-size:inherit;">CVE-2026-27778</span></div></div></td><td style="width:98.3594px;"> <span>7.5</span></td><td style="width:99.9375px;"> <span><span>High</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span>0.176</span></span></td><td style="width:100.328px;"> <span>CWE-307</span></td></tr><tr><td style="width:174px;"> <span>ePower</span></td><td style="width:476px;"> <span>ePower epower.ie</span><span>ePower epower.ie</span></td><td style="width:159.094px;"><div><div><span style="font-family:inherit;font-size:inherit;">CVE-2026-24912</span></div></div></td><td style="width:98.3594px;"> <span><span>7.3</span></span></td><td style="width:99.9375px;"> <span><span>High</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span>0.102</span></span></td><td style="width:100.328px;"> <span>CWE-613</span></td></tr><tr><td style="width:174px;"> <span>ePower</span></td><td style="width:476px;"> <span>ePower epower.ie</span></td><td style="width:159.094px;"> CVE-2026-27770</td><td style="width:98.3594px;"> <span>6.5</span></td><td style="width:99.9375px;"> <span>Medium</span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span>0.128</span></span></td><td style="width:100.328px;"> <span><span> CWE-522</span></span></td></tr><tr><td style="width:174px;"> <span><span>Everon</span></span></td><td style="width:476px;"> <span><span>Everon OCPP Backends</span></span></td><td style="width:159.094px;"> CVE-2026-26288</td><td style="width:98.3594px;"> <span><span>9.4</span></span></td><td style="width:99.9375px;"> <span><span>Critical</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span>0.275</span></span></td><td style="width:100.328px;"> <span><span>CWE-306</span></span></td></tr><tr><td style="width:174px;"> <span><span>Everon</span></span></td><td style="width:476px;"> <span><span>Everon OCPP Backends</span></span></td><td style="width:159.094px;"> CVE-2026-24696<div></div></td><td style="width:98.3594px;"> <span><span>7.5</span></span></td><td style="width:99.9375px;"> <span><span>High</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span>0.176</span></span></td><td style="width:100.328px;"> <span><span> CWE-307</span></span></td></tr><tr style="height:60.3281px;"><td style="width:174px;"> <span><span>Everon</span></span></td><td style="width:476px;"> <span><span>Everon OCPP Backends</span></span></td><td style="width:159.094px;"> CVE-2026-20748<div></div></td><td style="width:98.3594px;"> <span><span>7.5</span></span></td><td style="width:99.9375px;"> <span><span>High</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span>0.102</span></span></td><td style="width:100.328px;"> <span><span> CWE-613</span></span></td></tr><tr><td style="width:174px;"> <span><span>Everon</span></span></td><td style="width:476px;"> <span><span>Everon OCPP Backends</span></span></td><td style="width:159.094px;"><div><div><span style="font-family:inherit;font-size:inherit;">CVE-2026-27027</span></div></div></td><td style="width:98.3594px;"> <span><span>6.5</span></span></td><td style="width:99.9375px;"> <span><span>Medium</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span>0.128</span></span></td><td style="width:100.328px;"><span><span> CWE-522</span></span> </td></tr><tr><td style="width:174px;"><span>Delta Electronics</span></td><td style="width:476px;"> <span>Delta Electronics CNCSoft-G2</span></td><td style="width:159.094px;"> <span>CVE-2026-3094</span></td><td style="width:98.3594px;"> 7.8</td><td style="width:99.9375px;">High</td><td style="width:99.8125px;" class="zp-selected-cell"> <span> 0.000</span></td><td style="width:105.297px;"> <span>0.029</span></td><td style="width:100.328px;"> <span>CWE-787</span></td></tr></tbody></table></div><p></p></div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br/></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br/>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de décembre 2025</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;">- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div></div><br/><p></p></div><p></p></div><p></p></div><p></p></div><p></p></div><p></p></div><p></p></div></div></div></div></div><div><div><div><div><p></p></div>
</div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 09 Mar 2026 09:55:59 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S9]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s9</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>CrowdStrike 2026 Global Threat Report : les cyberattaques sont de plus en plus rapides Le rapport 2026 de CrowdStrike montre qu’en 2025, les attaquants ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span></span></span></span></span><div><div><div><p style="margin-bottom:13.3333px;"></p><div><div><p style="font-weight:bold;margin-bottom:13.3333px;">CrowdStrike 2026 Global Threat Report : les cyberattaques sont de plus en plus rapides</p><div><p>Le rapport 2026 de CrowdStrike montre qu’en 2025, les attaquants sont devenus plus rapides, plus discrets et très assistés par l’IA. Le temps moyen entre l’accès initial et le mouvement latéral est tombé à 29 minutes, avec un record de 27 secondes. Les acteurs de la menace utilisent l’IA pour accélérer le phishing, l’ingénierie sociale et l’automatisation des attaques (+89% d’activité malveillante liée à l’IA). Ils ciblent aussi les systèmes d’IA d’entreprise via des injections malveillantes et l’exploitation de vulnérabilités. 82% des détections sont désormais sans malware : les attaquants abusent d’identifiants valides, de flux d’identité de confiance et d’intégrations SaaS légitimes. Les attaques supply chain, l’exploitation de zero-days (+42%) et la compromission d’équipements réseau (VPN, firewalls) marquent une forte hausse, notamment chez les acteurs liés à la Chine et à la Corée du Nord.</p></div><a href="https://www.crowdstrike.com/en-us/blog/crowdstrike-2026-global-threat-report-findings/" title="https://www.crowdstrike.com/en-us/blog/crowdstrike-2026-global-threat-report-findings/" rel="">https://www.crowdstrike.com/en-us/blog/crowdstrike-2026-global-threat-report-findings/</a><br/></div></div><p></p><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span><span><span><span><span><span><span>Rapport VulnCheck 2026 :&nbsp;<span>1 % des vulnérabilités divulguées ont été exploitées</span></span></span></span></span></span></span></span></span></p></div>
<div><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><p style="margin-bottom:13.3333px;">Le rapport revient sur les vulnérabilités qui ont été les plus utiles aux acteurs de la menace cyber. En 2025, à peine 1 % des vulnérabilités divulguées ont été exploitées sur 48 000 nouvelles CVEs. Il indique également que les POC pour les nouvelles CVE ont augmenté de 16,5 % en 2025, inondant les organisations de signaux « de risque » qui se sont souvent révélés être des fausses alertes ou des informations trompeuses générées par l'IA.</p><a href="https://wwv.vulncheck.com/2026-vulncheck-exploit-intelligence-report" title="https://wwv.vulncheck.com/2026-vulncheck-exploit-intelligence-report" rel="">https://wwv.vulncheck.com/2026-vulncheck-exploit-intelligence-report</a><br/><div><div><div><div><strong>Rapport sur les cybermenaces : la vulnérabilité croissante du secteur automobile</strong><br/></div><div>Dans ce rapport Upstream (société de cybersécurité), analyse l'évolution cyber-risques dans l'automobile et la mobilité intelligente, en mettant l'accent sur l'escalade des ransomwares qui ciblent les systèmes industriels (OT) et perturbent la production. Il souligne comment la convergence entre l'IT et l'OT, accélérée par l'intelligence artificielle et l'essor des véhicules définis par logiciel, élargit la surface d'attaque. Le document détaille ainsi la vulnérabilité globale des chaînes d'approvisionnement face à des attaques qui frappent désormais simultanément le cloud, les API et les systèmes physiques des véhicules.<br/></div><a href="https://info.upstream.auto/hubfs/Security_Report/Security_Report_2026/Upstream_2026_Global_Automotive_Cybersecurity_Report.pdf" title="https://info.upstream.auto/hubfs/Security_Report/Security_Report_2026/Upstream_2026_Global_Automoti…" rel="">https://info.upstream.auto/hubfs/Security_Report/Security_Report_2026/Upstream_2026_Global_Automoti…</a><br/></div></div>
</div><p></p><strong><p style="margin-bottom:13.3333px;line-height:2;"></p></strong><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnerability&nbsp;Corner :</span>&nbsp;</p></div></div><div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:179px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:146.641px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:227.391px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:761.609px;"><div><div><p><span>Liens&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:179px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20775" target="_blank" rel="noreferrer noopener"><span>CVE-2022-20775</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:146.641px;"><div><div><p><span>Cisco&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:227.391px;"><div><div><p><span>SD-WAN&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:761.609px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20775%2C%20https%3A//www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems%2C%20https%3A//www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems%2C%20https%3A//www.cisco.com/c/en/us/support/docs/csa/cisco-sa-sd-wan-priv-E6e8tEdF.html" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2022-20775, https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems, https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems, https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-sd-wan-priv-E6e8tEdF.html</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:179px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20127" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20127</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:146.641px;"><div><div><p><span>Cisco&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:227.391px;"><div><div><p><span>Catalyst SD-WAN Controller and Manager&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:761.609px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20127%2C%20https%3A//sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk%2C%20https%3A//www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems%2C%20https%3A//www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2026-20127, https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk, https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems, https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:179px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25108" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25108</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:146.641px;"><div><div><p><span>Soliton Systems K.K&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:227.391px;"><div><div><p><span>FileZen&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:761.609px;"><div><div><p><span></span><a href="https://jvn.jp/en/jp/JVN84622767/%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-25108" target="_blank" rel="noreferrer noopener"><span>https://jvn.jp/en/jp/JVN84622767/, https://nvd.nist.gov/vuln/detail/CVE-2026-25108</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>Critical&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>High&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>Medium&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>Low&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>Total&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>19&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>23&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>Vnet/IP Interface Package for CENTUM VP R6 (VP6C3300)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>6&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>Johnson Controls, Inc.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>Frick Controls Quantum HD&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>6&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>EV Energy&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>ev.energy&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>4&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>Gardyn&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>Home Kit Firmware&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>4&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>Mobility46&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>mobility46.se&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>4&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>Chargemap&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>chargemap.com&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>4&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>CloudCharge&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>cloudcharge.se&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>4&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>EV2GO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>ev2go.io&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>4&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>SWITCH EV&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>swtchenergy.com&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>4&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>InSAT&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>MasterSCADA&nbsp;BUK-TS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>2&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>Pelco, Inc.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>Sarix&nbsp;Professional IMP 3 Series&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Score&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Severity&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EPSS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Percentile&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CWE&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21718" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21718</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>10.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/327.html" target="_blank" rel="noreferrer noopener"><span>CWE-327</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>InSAT&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MasterSCADA&nbsp;BUK-TS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21410" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21410</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.163%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>37.216%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/89.html" target="_blank" rel="noreferrer noopener"><span>CWE-89</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>InSAT&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MasterSCADA&nbsp;BUK-TS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22553" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22553</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.424%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>61.749%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Chargemap&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>chargemap.com&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25851" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25851</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>CloudCharge&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>cloudcharge.se&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20781" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20781</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EV2GO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ev2go.io&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24731" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24731</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EV Energy&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ev.energy&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27772" target="_blank" rel="noreferrer noopener"><span>CVE-2026-27772</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Mobility46&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>mobility46.se&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27028" target="_blank" rel="noreferrer noopener"><span>CVE-2026-27028</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SWITCH EV&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>swtchenergy.com&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27767" target="_blank" rel="noreferrer noopener"><span>CVE-2026-27767</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Gardyn&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Home Kit Firmware&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-1242" target="_blank" rel="noreferrer noopener"><span>CVE-2025-1242</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.028%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.746%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/798.html" target="_blank" rel="noreferrer noopener"><span>CWE-798</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Gardyn&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Home Kit Firmware&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-29631" target="_blank" rel="noreferrer noopener"><span>CVE-2025-29631</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.258%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>48.915%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Johnson Controls, Inc.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Frick Controls Quantum HD&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21654" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21654</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Johnson Controls, Inc.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Frick Controls Quantum HD&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21656" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21656</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/94.html" target="_blank" rel="noreferrer noopener"><span>CWE-94</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Johnson Controls, Inc.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Frick Controls Quantum HD&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21657" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21657</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/94.html" target="_blank" rel="noreferrer noopener"><span>CWE-94</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Johnson Controls, Inc.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Frick Controls Quantum HD&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21658" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21658</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/94.html" target="_blank" rel="noreferrer noopener"><span>CWE-94</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24663" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24663</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25085" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25085</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/394.html" target="_blank" rel="noreferrer noopener"><span>CWE-394</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Gardyn&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Home Kit Firmware&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-29628" target="_blank" rel="noreferrer noopener"><span>CVE-2025-29628</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.016%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.203%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/319.html" target="_blank" rel="noreferrer noopener"><span>CWE-319</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Gardyn&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Home Kit Firmware&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-29629" target="_blank" rel="noreferrer noopener"><span>CVE-2025-29629</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.029%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.068%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/1392.html" target="_blank" rel="noreferrer noopener"><span>CWE-1392</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20742" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20742</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20764" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20764</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20902" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20902</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20910" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20910</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21389" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21389</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23702" target="_blank" rel="noreferrer noopener"><span>CVE-2026-23702</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24452" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24452</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24517" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24517</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24689" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24689</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24695" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24695</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25037" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25037</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25105" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25105</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25109" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25109</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25111" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25111</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25195" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25195</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25196" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25196</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25721" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25721</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3037" target="_blank" rel="noreferrer noopener"><span>CVE-2026-3037</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Chargemap&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>chargemap.com&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20792" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20792</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/307.html" target="_blank" rel="noreferrer noopener"><span>CWE-307</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>CloudCharge&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>cloudcharge.se&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25114" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25114</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/307.html" target="_blank" rel="noreferrer noopener"><span>CWE-307</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EV2GO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ev2go.io&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25945" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25945</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/307.html" target="_blank" rel="noreferrer noopener"><span>CWE-307</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EV Energy&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ev.energy&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24445" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24445</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/307.html" target="_blank" rel="noreferrer noopener"><span>CWE-307</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Johnson Controls, Inc.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Frick Controls Quantum HD&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21659" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21659</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/23.html" target="_blank" rel="noreferrer noopener"><span>CWE-23</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Mobility46&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>mobility46.se&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-26305" target="_blank" rel="noreferrer noopener"><span>CVE-2026-26305</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/307.html" target="_blank" rel="noreferrer noopener"><span>CWE-307</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Pelco, Inc.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Sarix&nbsp;Professional IMP 3 Series&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1241" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1241</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/288.html" target="_blank" rel="noreferrer noopener"><span>CWE-288</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SWITCH EV&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>swtchenergy.com&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25113" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25113</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/307.html" target="_blank" rel="noreferrer noopener"><span>CWE-307</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Chargemap&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>chargemap.com&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25711" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25711</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/613.html" target="_blank" rel="noreferrer noopener"><span>CWE-613</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>CloudCharge&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>cloudcharge.se&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27652" target="_blank" rel="noreferrer noopener"><span>CVE-2026-27652</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/613.html" target="_blank" rel="noreferrer noopener"><span>CWE-613</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EV2GO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ev2go.io&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20895" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20895</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/613.html" target="_blank" rel="noreferrer noopener"><span>CWE-613</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EV Energy&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ev.energy&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-26290" target="_blank" rel="noreferrer noopener"><span>CVE-2026-26290</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/613.html" target="_blank" rel="noreferrer noopener"><span>CWE-613</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Mobility46&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>mobility46.se&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27647" target="_blank" rel="noreferrer noopener"><span>CVE-2026-27647</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/613.html" target="_blank" rel="noreferrer noopener"><span>CWE-613</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SWITCH EV&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>swtchenergy.com&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25778" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25778</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/613.html" target="_blank" rel="noreferrer noopener"><span>CWE-613</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Vnet/IP Interface Package for CENTUM VP R6 (VP6C3300)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-1924" target="_blank" rel="noreferrer noopener"><span>CVE-2025-1924</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.9&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.011%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.207%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/787.html" target="_blank" rel="noreferrer noopener"><span>CWE-787</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Chargemap&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>chargemap.com&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20791" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20791</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>CloudCharge&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>cloudcharge.se&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20733" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20733</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EV2GO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ev2go.io&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22890" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22890</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EV Energy&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ev.energy&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25774" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25774</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Mobility46&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>mobility46.se&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22878" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22878</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SWITCH EV&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>swtchenergy.com&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27773" target="_blank" rel="noreferrer noopener"><span>CVE-2026-27773</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Johnson Controls, Inc.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Frick Controls Quantum HD&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21660" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21660</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/256.html" target="_blank" rel="noreferrer noopener"><span>CWE-256</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Vnet/IP Interface Package for CENTUM VP R6 (VP6C3300)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48019" target="_blank" rel="noreferrer noopener"><span>CVE-2025-48019</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.011%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.215%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/617.html" target="_blank" rel="noreferrer noopener"><span>CWE-617</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Vnet/IP Interface Package for CENTUM VP R6 (VP6C3300)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48020" target="_blank" rel="noreferrer noopener"><span>CVE-2025-48020</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.011%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.215%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/617.html" target="_blank" rel="noreferrer noopener"><span>CWE-617</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Vnet/IP Interface Package for CENTUM VP R6 (VP6C3300)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48021" target="_blank" rel="noreferrer noopener"><span>CVE-2025-48021</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.011%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.215%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/191.html" target="_blank" rel="noreferrer noopener"><span>CWE-191</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Vnet/IP Interface Package for CENTUM VP R6 (VP6C3300)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48022" target="_blank" rel="noreferrer noopener"><span>CVE-2025-48022</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.011%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.215%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/130.html" target="_blank" rel="noreferrer noopener"><span>CWE-130</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Vnet/IP Interface Package for CENTUM VP R6 (VP6C3300)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48023" target="_blank" rel="noreferrer noopener"><span>CVE-2025-48023</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.011%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.215%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/617.html" target="_blank" rel="noreferrer noopener"><span>CWE-617</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20797" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20797</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/121.html" target="_blank" rel="noreferrer noopener"><span>CWE-121</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22877" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22877</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.7&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/22.html" target="_blank" rel="noreferrer noopener"><span>CWE-22</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br/></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br/>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de décembre 2025</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5 mars&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;échanges&nbsp;de&nbsp;fichiers&nbsp;entre les zones&nbsp;industrielles&nbsp;et IT, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/7abb2065-6cf1-41bd-956a-9eaaf4655853%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div></div><p></p></div><p></p></div><p></p></div><p></p></div></div></div></div></div><div><div><div><div><p></p></div>
</div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 01 Mar 2026 19:02:37 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S8]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s8</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Rapport 2026 de Dragos sur la cybersécurité en environnement OT Dragos met en évidence dans son article que le nombre d’acteurs développant des capacit ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span></span></span></span></span><div><div><div><p style="margin-bottom:13.3333px;"></p><div><p style="font-weight:bold;margin-bottom:13.3333px;"><span style="font-weight:bold;">Rapport 2026 de Dragos sur la cybersécurité en environnement OT</span></p><div><p>Dragos met en évidence dans son article que le nombre d’acteurs développant des capacités spécifiques aux environnements industriels continue de croître. 3 nouveaux groupes visant spécifiquement les installations industrielles ont été identifiés. Également, le rapport met en avant le nouveau mode opératoire de ces groupes qui ne se contentent plus d'obtenir l'accès et d'attendre mais bien d'apprendre le fonctionnement des processus physiques afin de pouvoir les perturber.</p></div><a href="https://www.dragos.com/ot-cybersecurity-year-in-review" rel="">https://www.dragos.com/ot-cybersecurity-year-in-review</a></div><p></p><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span><span><span><span><span>Analyse des menaces OT/IoT au second semestre 2025 et stratégies de renforcement de la cybersécurité</span></span></span></span></span></span></p></div>
<div><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><p style="margin-bottom:13.3333px;">Ce rapport publié par Nozomi Networks analyse les tendances de cybersécurité OT et IoT au second semestre 2025, en identifiant les principales techniques d’attaque, les secteurs les plus ciblés et les acteurs de menace. Il dresse un état des lieux des vulnérabilités présentes dans les environnements industriels, souligne les risques liés aux réseaux sans fil et à l’activité des botnets IoT et met en avant l’évolution des malwares.</p><p style="margin-bottom:13.3333px;"><a href="https://fr.nozominetworks.com/ot-iot-cybersecurity-trends-insights-february-2026" title="https://fr.nozominetworks.com/ot-iot-cybersecurity-trends-insights-february-2026" rel="">https://fr.nozominetworks.com/ot-iot-cybersecurity-trends-insights-february-2026</a></p><div><div><strong>Cyberespionnage et sabotage : Les nouvelles menaces contre la base industrielle de la défense</strong><br/></div><div>Google souligne l'évolution des cybermenaces, qui ciblent l'industrie mondiale de la défense et de l'aérospatiale, notamment à travers les opérations d'espionnage d'acteurs étatiques (tels que la Russie, la Chine, la Corée du Nord et l'Iran). L'article montre la vulnérabilité croissante de la chaîne d'approvisionnement face à la cybercriminalité et à l'hacktivisme, tout en démontrant comment les attaquants contournent la sécurité en ciblant directement le personnel, les processus de recrutement et les périphériques non surveillés.<br/></div><div><div><a href="https://cloud.google.com/blog/topics/threat-intelligence/threats-to-defense-industrial-base" title="https://cloud.google.com/blog/topics/threat-intelligence/threats-to-defense-industrial-base" rel="">https://cloud.google.com/blog/topics/threat-intelligence/threats-to-defense-industrial-base</a><br/></div></div><div><div><p><strong>Méthodologie de l'agence européenne de cybersécurité (ENISA) pour les exercices de crise cyber</strong></p><p style="margin-bottom:13.3333px;">L'ENISA met à disposition une méthodologie pour planifier, réaliser et évaluer un exercice de crise cyber. Toutes les étapes sont détaillés dans la méthodologie avec des conseils pour les professionels. L'agence européenne, met également à disposition un ensemble de modèles et de documents permettant aux planificateurs d'organiser des exercices efficaces.</p><a href="https://www.enisa.europa.eu/publications/the-enisa-cybersecurity-exercise-methodology" rel="">https://www.enisa.europa.eu/publications/the-enisa-cybersecurity-exercise-methodology</a></div></div><div><div><p style="font-weight:bold;"><strong>Cybermenaces : un risque stratégique en forte hausse</strong></p><p>Le rapport explique que les cyberattaques font aujourd’hui partie des risques les plus sérieux, surtout dans les pays du G7. Les campagnes de désinformation et les attaques contre les infrastructures critiques inquiètent de plus en plus. Globalement, la cyber n’est plus un risque secondaire : elle est désormais vue comme une menace majeure dans un contexte de fortes tensions internationales.<br/></p><a href="https://securityconference.org/en/publications/munich-security-report/2026/munich-security-index-2026/" rel="">https://securityconference.org/en/publications/munich-security-report/2026/munich-security-index-2026/</a></div></div>
</div><p></p><strong><p style="margin-bottom:13.3333px;line-height:2;"></p></strong><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnerability&nbsp;Corner :</span>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:163px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.297px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:225.141px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:787.859px;"><div><div><p><span>Liens&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:163px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2008-0015" target="_blank" rel="noreferrer noopener"><span>CVE-2008-0015</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.297px;"><div><div><p><span>Microsoft&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:225.141px;"><div><div><p><span>Windows&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:787.859px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2008-0015%2C%20https%3A//web.archive.org/web/20110305211119/https%3A//www.microsoft.com/technet/security/bulletin/ms09-032.mspx" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2008-0015, https://web.archive.org/web/20110305211119/https://www.microsoft.com/technet/security/bulletin/ms09-032.mspx</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:163px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7796" target="_blank" rel="noreferrer noopener"><span>CVE-2020-7796</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.297px;"><div><div><p><span>Synacor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:225.141px;"><div><div><p><span>Zimbra Collaboration Suite&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:787.859px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7796%2C%20https%3A//wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2020-7796, https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:163px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22175" target="_blank" rel="noreferrer noopener"><span>CVE-2021-22175</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.297px;"><div><div><p><span>GitLab&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:225.141px;"><div><div><p><span>GitLab&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:787.859px;"><div><div><p><span></span><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22175.json%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2021-22175" target="_blank" rel="noreferrer noopener"><span>https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22175.json, https://nvd.nist.gov/vuln/detail/CVE-2021-22175</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:163px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-7694" target="_blank" rel="noreferrer noopener"><span>CVE-2024-7694</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.297px;"><div><div><p><span>TeamT5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:225.141px;"><div><div><p><span>ThreatSonar&nbsp;Anti-Ransomware&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:787.859px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-7694%2C%20https%3A//teamt5.org/en/posts/vulnerability-notice-threat-sonar-anti-ransomware-20240715/%2C%20https%3A//www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2024-7694, https://teamt5.org/en/posts/vulnerability-notice-threat-sonar-anti-ransomware-20240715/, https://www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:163px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22769" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22769</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.297px;"><div><div><p><span>Dell&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:225.141px;"><div><div><p><span>RecoverPoint for Virtual Machines (RP4VMs)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:787.859px;"><div><div><p><span></span><a href="https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-22769%2C%20https%3A//www.dell.com/support/kbdoc/en-us/000426742/recoverpoint-for-vms-apply-the-remediation-script-for-dsa%2C%20https%3A//www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079" target="_blank" rel="noreferrer noopener"><span>https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day, https://nvd.nist.gov/vuln/detail/CVE-2026-22769, https://www.dell.com/support/kbdoc/en-us/000426742/recoverpoint-for-vms-apply-the-remediation-script-for-dsa, https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:163px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-2441" target="_blank" rel="noreferrer noopener"><span>CVE-2026-2441</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.297px;"><div><div><p><span>Google&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:225.141px;"><div><div><p><span>Chromium&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:787.859px;"><div><div><p><span></span><a href="https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-2441" target="_blank" rel="noreferrer noopener"><span>https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html, https://nvd.nist.gov/vuln/detail/CVE-2026-2441</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:265px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:552px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.2812px;"><div><div><p><span>Critical&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.688px;"><div><div><p><span>High&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:108.906px;"><div><div><p><span>Medium&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.0625px;"><div><div><p><span>Low&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:91.4062px;"><div><div><p><span>Total&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:265px;"><div><div><p><span>Jinan USR IOT Technology Limited (PUSR)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:552px;" class="zp-selected-cell"><div><div><p><span>USR-W610&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.2812px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.688px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:108.906px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.0625px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:91.4062px;"><div><div><p><span>4&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:265px;"><div><div><p><span>GE&nbsp;Vernova&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:552px;"><div><div><p><span>Enervista&nbsp;UR Setup&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.2812px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.688px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:108.906px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.0625px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:91.4062px;"><div><div><p><span>2&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:265px;"><div><div><p><span>EnOcean&nbsp;Edge Inc&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:552px;"><div><div><p><span>SmartServer&nbsp;IoT&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.2812px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.688px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:108.906px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.0625px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:91.4062px;"><div><div><p><span>2&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:265px;"><div><div><p><span>Welker&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:552px;"><div><div><p><span>OdorEyes&nbsp;EcoSystem&nbsp;Pulse Bypass System with XL4 Controller&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.2812px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.688px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:108.906px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.0625px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:91.4062px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:265px;"><div><div><p><span>Honeywell&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:552px;"><div><div><p><span>I-HIB2PI-UL 2MP IP&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.2812px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.688px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:108.906px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.0625px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:91.4062px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:265px;"><div><div><p><span>Delta Electronics&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:552px;"><div><div><p><span>ASDA-Soft&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.2812px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.688px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:108.906px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.0625px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:91.4062px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:265px;"><div><div><p><span>Valmet&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:552px;"><div><div><p><span>Valmet DNA Engineering Web Tools&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.2812px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.688px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:108.906px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.0625px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:91.4062px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Score&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Severity&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EPSS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Percentile&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CWE&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Honeywell&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>I-HIB2PI-UL 2MP IP&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1670" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1670</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.039%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>11.863%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Jinan USR IOT Technology Limited (PUSR)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>USR-W610&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25715" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25715</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/521.html" target="_blank" rel="noreferrer noopener"><span>CWE-521</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Valmet&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Valmet DNA Engineering Web Tools&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-15577" target="_blank" rel="noreferrer noopener"><span>CVE-2025-15577</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.049%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>15.352%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/22.html" target="_blank" rel="noreferrer noopener"><span>CWE-22</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Welker&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>OdorEyes&nbsp;EcoSystem&nbsp;Pulse Bypass System with XL4 Controller&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24790" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24790</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EnOcean&nbsp;Edge Inc&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SmartServer&nbsp;IoT&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20761" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20761</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/77.html" target="_blank" rel="noreferrer noopener"><span>CWE-77</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Delta Electronics&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ASDA-Soft&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1361" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1361</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.011%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.514%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/121.html" target="_blank" rel="noreferrer noopener"><span>CWE-121</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>GE&nbsp;Vernova&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Enervista&nbsp;UR Setup&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1762" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1762</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.031%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.943%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/427.html" target="_blank" rel="noreferrer noopener"><span>CWE-427</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Jinan USR IOT Technology Limited (PUSR)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>USR-W610&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24455" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24455</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/319.html" target="_blank" rel="noreferrer noopener"><span>CWE-319</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Jinan USR IOT Technology Limited (PUSR)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>USR-W610&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-26048" target="_blank" rel="noreferrer noopener"><span>CVE-2026-26048</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Jinan USR IOT Technology Limited (PUSR)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>USR-W610&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-26049" target="_blank" rel="noreferrer noopener"><span>CVE-2026-26049</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.7&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EnOcean&nbsp;Edge Inc&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SmartServer&nbsp;IoT&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22885" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22885</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.7&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener"><span>CWE-125</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>GE&nbsp;Vernova&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Enervista&nbsp;UR Setup&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1763" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1763</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.674%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/35.html" target="_blank" rel="noreferrer noopener"><span>CWE-35</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br/></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br/>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de décembre 2025</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5 mars&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;échanges&nbsp;de&nbsp;fichiers&nbsp;entre les zones&nbsp;industrielles&nbsp;et IT, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/7abb2065-6cf1-41bd-956a-9eaaf4655853%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div></div><br/><p></p></div>
</div><br/><br/><p></p></div><p></p></div><p></p></div></div></div></div></div><div><div><div><div><p></p></div>
</div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 23 Feb 2026 08:16:00 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S7]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s7</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Menaces cyber contre le transport maritime canadien Ce rapport du Centre canadien pour la cybersécurité analyse les risques cyber visant le secteur du ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span></span></span></span></span><div><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span><span><span>Menaces cyber contre le transport maritime canadien</span></span></span></span></p></div><div><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><p style="margin-bottom:13.3333px;">Ce rapport du Centre canadien pour la cybersécurité analyse les risques cyber visant le secteur du transport maritime, qui représente plus de 8,3 milliards $ du PIB et une part majeure des importations (24 %) et exportations (18 %) du Canada. La menace principale provient des cybercriminels, surtout via le ransomware, qui peuvent bloquer les opérations portuaires et perturber les chaînes d’approvisionnement. La digitalisation croissante des ports et des navires (capteurs, OT connectée, systèmes satellitaires) élargit fortement la surface d’attaque. Les systèmes de positionnement (GPS, AIS) sont vulnérables au brouillage et au spoofing, pouvant entraîner des risques de navigation. Les États (Chine, Russie, Iran) ciblent le secteur pour l’espionnage économique, le vol de données logistiques et de propriété intellectuelle.</p><p style="margin-bottom:13.3333px;"></p><div><p style="font-weight:bold;"><span style="font-weight:bold;">LOTP : la nouvelle menace invisible au cœur des usines</span></p><p>Cet article présente le concept de « Living Off The Plant » (LOTP), une technique utilisant les fonctions natives des automates pour s'infiltrer dans les réseaux industriels. L'auteur démontre comment détourner des commandes légitimes pour circuler entre des équipements isolés, franchissant ainsi des barrières réseaux physiques ou série. Cette méthode de mouvement latéral permet d'agir sans utiliser de logiciels malveillants externes. L'objectif est d'alerter sur la vulnérabilité des architectures de sécurité actuelles et de repenser la protection des infrastructures critiques.</p><p><a href="https://www.researchgate.net/publication/399059887_Industrial_Ouroboros_Deep_Lateral_Movement_via_Living_Off_the_Plant/fulltext/694caeea06a9ab54f84a6f1b/Industrial-Ouroboros-Deep-Lateral-Movement-via-Living-Off-the-Plant.pdf?_tp=eyJjb250ZXh0Ijp7ImZpcnN0UG" rel="">https://www.researchgate.net/publication/399059887_Industrial_Ouroboros_Deep_Lateral_Movement_via_Living_Off_the_Plant/fulltext/694caeea06a9ab54f84a6f1b/Industrial-Ouroboros-Deep-Lateral-Movement-via-Living-Off-the-Plant.pdf?_tp=eyJjb250ZXh0Ijp7ImZpcnN0UG</a></p></div><p></p><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Campagne menée par APT28 exploitant la CVE-2026-21509</span></p><p>Le groupe de hackers APT28 lié à l’intelligence russe a lancé une campagne pour infecter des organisations européennes, notamment des agences maritimes et des compagnies de transport. Ce rapport détaille une nouvelle méthode d’intrusion ciblée contre des infrastructures critiques exploitant une faille récemment révélée dans Microsoft Office (CVE-2026-21509) dans les 24 heures suivant sa divulgation publique.</p><p><a href="https://www.trellix.com/blogs/research/apt28-stealthy-campaign-leveraging-cve-2026-21509-cloud-c2/" title="https://www.trellix.com/blogs/research/apt28-stealthy-campaign-leveraging-cve-2026-21509-cloud-c2/" rel="">https://www.trellix.com/blogs/research/apt28-stealthy-campaign-leveraging-cve-2026-21509-cloud-c2/</a></p><p></p><div><p style="margin-bottom:13.3333px;"><strong>L'intégration native de Sysmon dans Windows</strong><strong><br/></strong></p><p style="margin-bottom:13.3333px;">L'article annonce l'intégration native de la fonctionnalité Sysmon dans Windows 11 et Windows Server 2025 pour simplifier la surveillance des menaces. Cette mise à jour supprime le besoin d'installations manuelles en automatisant la maintenance via Windows Update. Elle offre une visibilité sur les activités suspectes, comme le vol d'identifiants, tout en bénéficiant du support technique de Microsoft. Cette version autorise l'usage de fichiers de configuration personnalisés pour alimenter les outils d'analyse de sécurité. Enfin, Microsoft prévoit d'y intégrer prochainement des analyses basées sur l'intelligence artificielle.</p><div><a href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/native-sysmon-functionality-coming-to-windows/4468112%C2%A0" rel="">https://techcommunity.microsoft.com/blog/windows-itpro-blog/native-sysmon-functionality-coming-to-windows/4468112</a>&nbsp;</div></div><p></p><p style="margin-bottom:13.3333px;line-height:2;"></p><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnerability&nbsp;Corner :</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:144px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span>Liens&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43468" target="_blank" rel="noreferrer noopener"><span>CVE-2024-43468</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Microsoft&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Configuration Manager&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43468%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2024-43468" target="_blank" rel="noreferrer noopener"><span>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43468, https://nvd.nist.gov/vuln/detail/CVE-2024-43468</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-15556" target="_blank" rel="noreferrer noopener"><span>CVE-2025-15556</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Notepad++&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Notepad++&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://community.notepad-plus-plus.org/topic/27298/notepad-v8-8-9-vulnerability-fix%2C%20https%3A//notepad-plus-plus.org/news/clarification-security-incident/%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-15556" target="_blank" rel="noreferrer noopener"><span>https://community.notepad-plus-plus.org/topic/27298/notepad-v8-8-9-vulnerability-fix, https://notepad-plus-plus.org/news/clarification-security-incident/, https://nvd.nist.gov/vuln/detail/CVE-2025-15556</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40536" target="_blank" rel="noreferrer noopener"><span>CVE-2025-40536</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>SolarWinds&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Web Help Desk&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_2026-1_release_notes.htm%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-40536%2C%20https%3A//www.solarwinds.com/trust-center/security-advisories/CVE-2025-40536" target="_blank" rel="noreferrer noopener"><span>https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_2026-1_release_notes.htm, https://nvd.nist.gov/vuln/detail/CVE-2025-40536, https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-40536</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20700" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20700</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Apple&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Multiple Products&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20700%2C%20https%3A//support.apple.com/en-us/126346%2C%20https%3A//support.apple.com/en-us/126348%2C%20https%3A//support.apple.com/en-us/126351%2C%20https%3A//support.apple.com/en-us/126352%2C%20https%3A//support.apple.com/en-us/126353" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2026-20700, https://support.apple.com/en-us/126346, https://support.apple.com/en-us/126348, https://support.apple.com/en-us/126351, https://support.apple.com/en-us/126352, https://support.apple.com/en-us/126353</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21510" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21510</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Microsoft&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Windows&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-21510" target="_blank" rel="noreferrer noopener"><span>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510, https://nvd.nist.gov/vuln/detail/CVE-2026-21510</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21513" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21513</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Microsoft&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Windows&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://msrc.microsoft.com/update-guide/advisory/CVE-2026-21513%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-21513" target="_blank" rel="noreferrer noopener"><span>https://msrc.microsoft.com/update-guide/advisory/CVE-2026-21513, https://nvd.nist.gov/vuln/detail/CVE-2026-21513</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21514" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21514</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Microsoft&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Office&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-21514" target="_blank" rel="noreferrer noopener"><span>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514, https://nvd.nist.gov/vuln/detail/CVE-2026-21514</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21519" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21519</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Microsoft&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Windows&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-21519" target="_blank" rel="noreferrer noopener"><span>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519, https://nvd.nist.gov/vuln/detail/CVE-2026-21519</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21525" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21525</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Microsoft&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Windows&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21525%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-21525" target="_blank" rel="noreferrer noopener"><span>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21525, https://nvd.nist.gov/vuln/detail/CVE-2026-21525</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21533" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21533</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Microsoft&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Windows&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-21533" target="_blank" rel="noreferrer noopener"><span>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533, https://nvd.nist.gov/vuln/detail/CVE-2026-21533</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr style="height:54.15px;"><td style="vertical-align:top;width:167.2px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:597.8px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:104.425px;"><div><div><p><span>Critical&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:103.45px;"><div><div><p><span>High&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.875px;"><div><div><p><span>Medium&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:101.4px;"><div><div><p><span>Low&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.363px;"><div><div><p><span>Total&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:167.2px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:597.8px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:104.425px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:103.45px;"><div><div><p><span>4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.875px;"><div><div><p><span>5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:101.4px;"><div><div><p><span>5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.363px;"><div><div><p><span>14&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:167.2px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:597.8px;"><div><div><p><span>Desigo&nbsp;CC family V6,NX,Polarion V2404,SINEC&nbsp;NMS,Siveillance&nbsp;Video V2022 R3,Solid&nbsp;Edge&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:104.425px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:103.45px;"><div><div><p><span>8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.875px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:101.4px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.363px;"><div><div><p><span>9&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:167.2px;"><div><div><p><span>AVEVA&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:597.8px;"><div><div><p><span>PI Data Archive PI&nbsp;Server,PI&nbsp;to CONNECT Agent&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:104.425px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:103.45px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.875px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:101.4px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.363px;"><div><div><p><span>2&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:167.2px;"><div><div><p><span>ZLAN Information Technology Co.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:597.8px;"><div><div><p><span>ZLAN5143D&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:104.425px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:103.45px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.875px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:101.4px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.363px;"><div><div><p><span>2&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:167.2px;"><div><div><p><span>Airleader&nbsp;GmbH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:597.8px;"><div><div><p><span>Airleader&nbsp;Master&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:104.425px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:103.45px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.875px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:101.4px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.363px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:167.2px;"><div><div><p><span>ZOLL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:597.8px;"><div><div><p><span>ePCR&nbsp;IOS Mobile Application&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:104.425px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:103.45px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.875px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:101.4px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.363px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Score&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Severity&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EPSS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Percentile&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CWE&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Airleader&nbsp;GmbH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Airleader&nbsp;Master&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1358" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1358</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/434.html" target="_blank" rel="noreferrer noopener"><span>CWE-434</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>ZLAN Information Technology Co.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ZLAN5143D&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24789" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24789</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.067%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>20.700%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>ZLAN Information Technology Co.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ZLAN5143D&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25084" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25084</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.074%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>22.265%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Desigo&nbsp;CC family V6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38545" target="_blank" rel="noreferrer noopener"><span>CVE-2023-38545</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>26.250%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>96.176%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/122.html" target="_blank" rel="noreferrer noopener"><span>CWE-122</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66597" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66597</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.029%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.888%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/327.html" target="_blank" rel="noreferrer noopener"><span>CWE-327</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66600" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66600</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.044%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>13.256%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/358.html" target="_blank" rel="noreferrer noopener"><span>CWE-358</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Solid Edge&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40936" target="_blank" rel="noreferrer noopener"><span>CVE-2025-40936</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.020%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.747%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener"><span>CWE-125</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>NX&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22923" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22923</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.006%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.269%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/121.html" target="_blank" rel="noreferrer noopener"><span>CWE-121</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>NX&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22924" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22924</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener"><span>CWE-125</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>NX&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22925" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22925</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener"><span>CWE-125</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SINEC NMS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25655" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25655</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.006%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.322%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/427.html" target="_blank" rel="noreferrer noopener"><span>CWE-427</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SINEC NMS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25656" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25656</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.006%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.322%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/427.html" target="_blank" rel="noreferrer noopener"><span>CWE-427</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Polarion&nbsp;V2404&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40587" target="_blank" rel="noreferrer noopener"><span>CVE-2025-40587</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.016%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.935%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer noopener"><span>CWE-79</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>AVEVA&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>PI Data Archive PI Server&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1507" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1507</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.054%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>17.000%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/248.html" target="_blank" rel="noreferrer noopener"><span>CWE-248</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66608" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66608</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.061%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>18.874%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/29.html" target="_blank" rel="noreferrer noopener"><span>CWE-29</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66598" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66598</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.029%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.803%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/327.html" target="_blank" rel="noreferrer noopener"><span>CWE-327</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>AVEVA&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>PI to CONNECT Agent&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1495" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1495</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.015%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.518%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/532.html" target="_blank" rel="noreferrer noopener"><span>CWE-532</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66601" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66601</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.044%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>13.256%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/358.html" target="_blank" rel="noreferrer noopener"><span>CWE-358</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Siveillance&nbsp;Video V2022 R3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-0836" target="_blank" rel="noreferrer noopener"><span>CVE-2025-0836</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.044%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>13.176%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer noopener"><span>CWE-862</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>ZOLL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ePCR&nbsp;IOS Mobile Application&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-12699" target="_blank" rel="noreferrer noopener"><span>CVE-2025-12699</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.011%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.338%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/538.html" target="_blank" rel="noreferrer noopener"><span>CWE-538</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66594" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66594</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.042%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>12.655%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/209.html" target="_blank" rel="noreferrer noopener"><span>CWE-209</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66595" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66595</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.019%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.353%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/352.html" target="_blank" rel="noreferrer noopener"><span>CWE-352</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66599" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66599</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.042%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>12.655%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/497.html" target="_blank" rel="noreferrer noopener"><span>CWE-497</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66602" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66602</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.041%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>12.217%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/291.html" target="_blank" rel="noreferrer noopener"><span>CWE-291</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66607" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66607</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.7&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.044%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>13.256%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/358.html" target="_blank" rel="noreferrer noopener"><span>CWE-358</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66606" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66606</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.047%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>14.428%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/86.html" target="_blank" rel="noreferrer noopener"><span>CWE-86</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66603" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66603</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.044%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>13.256%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/358.html" target="_blank" rel="noreferrer noopener"><span>CWE-358</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66604" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66604</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.029%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.888%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/319.html" target="_blank" rel="noreferrer noopener"><span>CWE-319</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66605" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66605</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.042%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>12.655%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/359.html" target="_blank" rel="noreferrer noopener"><span>CWE-359</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br/></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br/>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de décembre 2025</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5 mars&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;échanges&nbsp;de&nbsp;fichiers&nbsp;entre les zones&nbsp;industrielles&nbsp;et IT, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/7abb2065-6cf1-41bd-956a-9eaaf4655853%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div></div><br/><br/><p></p></div></div></div></div></div><div><div><div><div><p></p></div></div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 15 Feb 2026 15:27:39 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S6]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s6</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Des satellites espions russes ont potentiellement intercepté les communications de satellites européens clés Selon une enquête du Financial Times, des ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span></span></span></span></span><div><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span><span>Des satellites espions russes ont potentiellement intercepté les communications de satellites européens clés</span></span></span></p></div><div><div><p style="margin-bottom:13.3333px;">Selon une enquête du Financial Times, des satellites espions russes auraient été en mesure d’intercepter les communications de plusieurs satellites européens stratégiques. Les autorités s’inquiètent du fait que certaines données sensibles, notamment les commandes de contrôle, ne soient pas chiffrées, en raison de l’ancienneté de nombreux satellites dépourvus de capacités de chiffrement avancées.</p><a href="https://www.ft.com/content/cd08c49c-658e-49c9-9a15-234f2bfc2074?accessToken=zwAGSfx71WnQkdPNCMScZY5JydOaFSNPK_wgdA.MEYCIQCfIo-xwIzKl6Rj8Yc80moWlg3qppbpuQ3cJKlt-dXVhQIhAN2mzsy8lpLFcWLKAa3opFRv4qR8RFkTCyDpoEg31R9h&amp;sharetype=gift&amp;token=a601ce5f-4c3c-42f9-98e" rel="">https://www.ft.com/content/cd08c49c-658e-49c9-9a15-234f2bfc2074?accessToken=zwAGSfx71WnQkdPNCMScZY5JydOaFSNPK_wgdA.MEYCIQCfIo-xwIzKl6Rj8Yc80moWlg3qppbpuQ3cJKlt-dXVhQIhAN2mzsy8lpLFcWLKAa3opFRv4qR8RFkTCyDpoEg31R9h&amp;sharetype=gift&amp;token=a601ce5f-4c3c-42f9-98e</a><a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_26_105" title="https://ec.europa.eu/commission/presscorner/detail/en/ip_26_105" rel=""><br/></a></div></div></div><p style="margin-bottom:13.3333px;"><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"></span></p><div><div style="clear:both;overflow:visible;direction:ltr;"><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span><span><span>Menace Salt Typhoon sur les infrastructures 5G</span></span></span></span></p><p style="margin-bottom:13.3333px;"><span><span><span>Ce rapport, publié par Booz Allen et Palo Alto Networks, deux acteurs majeurs du conseil en cybersécurité et des technologies de défense des réseaux, explique que les infrastructures 5G sont devenues une cible stratégique pour des groupes APT étatiques comme Salt Typhoon, capables d’infiltrer les réseaux télécoms pour espionner et exfiltrer des données sensibles. Les attaques reposent sur des identifiants volés, des compromissions de la supply chain et des techniques furtives difficiles à détecter.</span></span></span></p><p style="margin-bottom:13.3333px;"><a href="https://www.boozallen.com/expertise/tech-ecosystem/5g-technology/hardening-5g-infrastructure-against-salt-typhoon.html" title="https://www.boozallen.com/expertise/tech-ecosystem/5g-technology/hardening-5g-infrastructure-against-salt-typhoon.html" rel="">https://www.boozallen.com/expertise/tech-ecosystem/5g-technology/hardening-5g-infrastructure-against-salt-typhoon.html</a></p><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Sécuriser l'OT : l'autre défi de la transition énergétique britannique</span><br/></span></p><p style="margin-bottom:13.3333px;">Cet article souligne l'urgence de sécuriser les technologies opérationnelles (OT) du secteur énergétique britannique face à sa transition vers un modèle décentralisé et renouvelable. Phil Tonkin (Field CTO at Dragos<i>), </i>explique que la multiplication des petites installations connectées et des systèmes de stockage par batterie accroît la surface d'attaque, rendant le réseau vulnérable à des pannes en cascade. Pour garantir la sécurité nationale, il préconise de dépasser la simple conformité réglementaire en investissant dans la visibilité des actifs, la segmentation des réseaux et la formation de personnel qualifié.<br/></p><p style="margin-bottom:13.3333px;"><a href="https://energy-oil-gas.com/news/ot-cybersecurity-issues-facing-the-uk-energy-industry/" title="https://energy-oil-gas.com/news/ot-cybersecurity-issues-facing-the-uk-energy-industry/" rel="">https://energy-oil-gas.com/news/ot-cybersecurity-issues-facing-the-uk-energy-industry/</a><br/></p><p style="margin-bottom:13.3333px;"><span><span><strong>Allemagne : Entrée en vigueur de la loi NIS-2 et renforcement des obligations cyber</strong></span></span><br/></p><p style="margin-bottom:13.3333px;"><span><span>La loi d'application NIS-2 en Allemagne modernise le cadre législatif cyber en élargissant la surveillance à 30 000 entreprises, incluant désormais les PME industrielles. Elle impose des obligations strictes de gestion des risques, un signalement des incidents sous 24 heures et une responsabilité directe des dirigeants. L'objectif est d'harmoniser la résilience opérationnelle du pays avec les standards européens d'ici avril 2026.<br/></span></span></p><p style="margin-bottom:13.3333px;"><a href="https://cyble.com/blog/nis-2-implementation-act-germany/" title="https://cyble.com/blog/nis-2-implementation-act-germany/" rel="">https://cyble.com/blog/nis-2-implementation-act-germany/</a><br/></p></div><div><p style="margin-bottom:13.3333px;line-height:1;"></p><div><p style="margin-bottom:13.3333px;"></p><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"></span></p></div></div></div></div><div><p style="margin-bottom:13.3333px;"></p><div><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnerability&nbsp;Corner :</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:206.2px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:211.387px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:300.613px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:573.15px;"><div><div><p><span>Liens&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:206.2px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19006" target="_blank" rel="noreferrer noopener"><span>CVE-2019-19006</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:211.387px;"><div><div><p><span>Sangoma&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:300.613px;"><div><div><p><span>FreePBX&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:573.15px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19006%2C%20https%3A//wiki.freepbx.org/display/FOP/2019-11-20%2BRemote%2BAdmin%2BAuthentication%2BBypass" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2019-19006, https://wiki.freepbx.org/display/FOP/2019-11-20%2BRemote%2BAdmin%2BAuthentication%2BBypass</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:206.2px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39935" target="_blank" rel="noreferrer noopener"><span>CVE-2021-39935</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:211.387px;"><div><div><p><span>GitLab&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:300.613px;"><div><div><p><span>Community and Enterprise Editions&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:573.15px;"><div><div><p><span></span><a href="https://about.gitlab.com/releases/2021/12/06/security-release-gitlab-14-5-2-released/%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2021-39935" target="_blank" rel="noreferrer noopener"><span>https://about.gitlab.com/releases/2021/12/06/security-release-gitlab-14-5-2-released/, https://nvd.nist.gov/vuln/detail/CVE-2021-39935</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:206.2px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11953" target="_blank" rel="noreferrer noopener"><span>CVE-2025-11953</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:211.387px;"><div><div><p><span>React Native Community&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:300.613px;"><div><div><p><span>CLI&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:573.15px;"><div><div><p><span></span><a href="https://github.com/react-native-community/cli/commit/15089907d1f1301b22c72d7f68846a2ef20df547%2C%20https%3A//github.com/react-native-community/cli/pull/2735%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-11953" target="_blank" rel="noreferrer noopener"><span>https://github.com/react-native-community/cli/commit/15089907d1f1301b22c72d7f68846a2ef20df547, https://github.com/react-native-community/cli/pull/2735, https://nvd.nist.gov/vuln/detail/CVE-2025-11953</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:206.2px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64328" target="_blank" rel="noreferrer noopener"><span>CVE-2025-64328</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:211.387px;"><div><div><p><span>Sangoma&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:300.613px;"><div><div><p><span>FreePBX&nbsp;&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:573.15px;"><div><div><p><span></span><a href="https://github.com/FreePBX/security-reporting/security/advisories/GHSA-vm9p-46mv-5xvw%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-64328" target="_blank" rel="noreferrer noopener"><span>https://github.com/FreePBX/security-reporting/security/advisories/GHSA-vm9p-46mv-5xvw, https://nvd.nist.gov/vuln/detail/CVE-2025-64328</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:206.2px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24423" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24423</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:211.387px;"><div><div><p><span>SmarterTools&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:300.613px;"><div><div><p><span>SmarterMail&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:573.15px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24423%2C%20https%3A//www.cve.org/CVERecord?id=CVE-2026-24423%2C%20https%3A%2F%2Fwww.smartertools.com%2Fsmartermail%2Frelease-notes%2Fcurrent" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2026-24423, https://www.cve.org/CVERecord?id=CVE-2026-24423, https://www.smartertools.com/smartermail/release-notes/current</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Critical&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>High&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Medium&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Low&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Total&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Avation&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Light Engine Pro&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Mitsubishi Electric&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>FREQSHIP-mini for Windows&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>RISS SRL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>MOMA Seismic Station&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Synectix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>LAN 232 TRIO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Score&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Severity&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EPSS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Percentile&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CWE&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Synectix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LAN 232 TRIO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1633" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1633</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>10.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.054%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>17.083%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Avation&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Light Engine Pro&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1341" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1341</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.016%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.895%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>RISS SRL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MOMA Seismic Station&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1632" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1632</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.133%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>33.272%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Mitsubishi Electric&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FREQSHIP-mini for Windows&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-10314" target="_blank" rel="noreferrer noopener"><span>CVE-2025-10314</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.009%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.682%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/276.html" target="_blank" rel="noreferrer noopener"><span>CWE-276</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br/></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br/>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de décembre 2025</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5 mars&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;échanges&nbsp;de&nbsp;fichiers&nbsp;entre les zones&nbsp;industrielles&nbsp;et IT, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/7abb2065-6cf1-41bd-956a-9eaaf4655853%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div></div><p></p></div></div></div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 08 Feb 2026 18:57:55 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S5]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s5</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>L’UE renforce sa résilience face aux cybermenaces La Commission européenne a présenté un nouveau paquet cybersécurité pour mieux protéger l’UE face aux ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span></span></span></span></span><div><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">L’UE renforce sa résilience face aux cybermenaces</span></p></div><div><p style="margin-bottom:13.3333px;"><span>La Commission européenne a présenté un nouveau paquet cybersécurité pour mieux protéger l’UE face aux cyberattaques visant les services essentiels et les institutions démocratiques. Il prévoit une révision du Cybersecurity Act afin de sécuriser les chaînes d’approvisionnement ICT, notamment face aux fournisseurs à risque hors UE. Le cadre européen de certification cybersécurité est simplifié pour garantir des produits “secure by design” tout en réduisant les coûts pour les entreprises. Des ajustements ciblés de la directive NIS2 visent à clarifier les obligations et alléger la charge de conformité pour près de 28 700 entreprises, dont de nombreuses PME. Enfin, le rôle de l’ENISA est renforcé pour améliorer la détection, la réponse aux incidents et le développement des compétences en cybersécurité en Europe.</span></p><a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_26_105" title="https://ec.europa.eu/commission/presscorner/detail/en/ip_26_105" rel="">https://ec.europa.eu/commission/presscorner/detail/en/ip_26_105</a><a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_26_105" title="https://ec.europa.eu/commission/presscorner/detail/en/ip_26_105" rel=""><br/></a></div></div><p style="margin-bottom:13.3333px;"><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"></span></p><div><div style="clear:both;overflow:visible;direction:ltr;"><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span><span>Transformation technologique et industrielle en 2026</span></span></span></p><p style="margin-bottom:13.3333px;"><span><span><span>L'article présente les changements technologiques majeurs prévus pour l'année 2026. Il cherche à démontrer que la sécurité informatique, la production industrielle et le travail humain doivent désormais s'adapter à l'intelligence artificielle. Cette transition illustré par des exemples de partenariats entre la Turquie et le Royaume-Uni, dont le but est de financer l'IA &quot;physique&quot; pour automatiser l'impression 3D industrielle. L'importance des infrastructures, comme la 5G, pour soutenir ces évolutions technologique est mis en avant. Enfin, l'article nous permet de comprendre comment les entreprises et les employés réagissent à ces transformations numériques.&nbsp;</span></span></span></p><p style="margin-bottom:13.3333px;"><a href="https://www.dailysabah.com/business/tech/iot-expansion-forcing-rethink-of-cybersecurity-architecture" title="https://www.dailysabah.com/business/tech/iot-expansion-forcing-rethink-of-cybersecurity-architecture" rel="">https://www.dailysabah.com/business/tech/iot-expansion-forcing-rethink-of-cybersecurity-architecture</a><br/></p><p style="margin-bottom:13.3333px;"><span><span style="font-weight:bold;"></span></span></p><p><strong>Cybersécurité OT-IT : naviguer dans la nouvelle frontière du risque</strong></p><p></p><p style="margin-bottom:13.3333px;"><span><span>La convergence entre les systèmes IT et OT entraîne une évolution de la surface d’attaque. Elle crée de nouvelles opportunités tout en introduisant des enjeux de cybersécurité. L’article identifie six domaines affectés par cette convergence, notamment l’évolution des menaces liée à l’usage de l’IA et la nécessité de mettre en œuvre des principes Zero Trust dans des environnements de plus en plus interconnectés.</span></span><br/></p><p style="margin-bottom:13.3333px;"><a href="https://www.forbes.com/sites/chuckbrooks/2026/01/27/otit-cybersecurity-navigating-the-new-frontier-of-risk/" title="https://www.forbes.com/sites/chuckbrooks/2026/01/27/otit-cybersecurity-navigating-the-new-frontier-of-risk/" rel="">https://www.forbes.com/sites/chuckbrooks/2026/01/27/otit-cybersecurity-navigating-the-new-frontier-of-risk/</a><br/></p></div><div><p style="margin-bottom:13.3333px;line-height:1;"></p><div><p style="margin-bottom:13.3333px;"></p><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span></span></span></p></div></div></div></div><div><p style="margin-bottom:13.3333px;"></p><div><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnerability&nbsp;Corner :</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div></div><p></p><table border="1"><tbody><tr><td style="vertical-align:top;width:195px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:132px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:123.844px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:834.156px;"><div><p><strong>Liens&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:195px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-14634" target="_blank" rel="noreferrer noopener">CVE-2018-14634</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132px;"><div><p>Linux&nbsp;</p></div></td><td style="vertical-align:top;width:123.844px;"><div><p>Kernal&nbsp;</p></div></td><td style="vertical-align:top;width:834.156px;"><div><p><a href="https://access.redhat.com/errata/RHSA-2018%3A3540%2C%20https%3A//git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/about/%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2018-14634%2C%20https%3A//www.cve.org/CVERecord?id=CVE-2018-14634%2C%20https%3A%2F%2Fwww.kernel.org%2F" target="_blank" rel="noreferrer noopener">https://access.redhat.com/errata/RHSA-2018:3540, https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/about/, https://nvd.nist.gov/vuln/detail/CVE-2018-14634, https://www.cve.org/CVERecord?id=CVE-2018-14634, https://www.kernel.org/</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:195px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-52691" target="_blank" rel="noreferrer noopener">CVE-2025-52691</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132px;"><div><p>SmarterTools&nbsp;</p></div></td><td style="vertical-align:top;width:123.844px;"><div><p>SmarterMail&nbsp;</p></div></td><td style="vertical-align:top;width:834.156px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-52691%2C%20https%3A//www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-124/%2C%20https%3A//www.smartertools.com/smartermail/release-notes/current" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2025-52691, https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-124/, https://www.smartertools.com/smartermail/release-notes/current</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:195px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1281" target="_blank" rel="noreferrer noopener">CVE-2026-1281</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132px;"><div><p>Ivanti&nbsp;</p></div></td><td style="vertical-align:top;width:123.844px;"><div><p>Endpoint Manager Mobile (EPMM)&nbsp;</p></div></td><td style="vertical-align:top;width:834.156px;"><div><p><a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-1281%2C%20https%3A//support.mobileiron.com/mi/vsp/AB1771634/ivanti-security-update-1761642-1.0.0L-5.noarch.rpm%2C%20https%3A//support.mobileiron.com/mi/vsp/AB1771634/ivanti-security-update-1761642-1.0.0S-5.noarch.rpm" target="_blank" rel="noreferrer noopener">https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340, https://nvd.nist.gov/vuln/detail/CVE-2026-1281, https://support.mobileiron.com/mi/vsp/AB1771634/ivanti-security-update-1761642-1.0.0L-5.noarch.rpm, https://support.mobileiron.com/mi/vsp/AB1771634/ivanti-security-update-1761642-1.0.0S-5.noarch.rpm</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:195px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23760" target="_blank" rel="noreferrer noopener">CVE-2026-23760</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132px;"><div><p>SmarterTools&nbsp;</p></div></td><td style="vertical-align:top;width:123.844px;"><div><p>SmarterMail&nbsp;</p></div></td><td style="vertical-align:top;width:834.156px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23760%2C%20https%3A//www.smartertools.com/smartermail/release-notes/current" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2026-23760, https://www.smartertools.com/smartermail/release-notes/current</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:195px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24061" target="_blank" rel="noreferrer noopener">CVE-2026-24061</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132px;"><div><p>GNU&nbsp;</p></div></td><td style="vertical-align:top;width:123.844px;"><div><p>InetUtils&nbsp;</p></div></td><td style="vertical-align:top;width:834.156px;"><div><p><a href="https://cgit.git.savannah.gnu.org/cgit/inetutils.git%2C%20https%3A//codeberg.org/inetutils/inetutils/commit/ccba9f748aa8d50a38d7748e2e60362edd6a32cc%2C%20https%3A//codeberg.org/inetutils/inetutils/commit/fd702c02497b2f398e739e3119bed0b23dd7aa7b%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-24061" target="_blank" rel="noreferrer noopener">https://cgit.git.savannah.gnu.org/cgit/inetutils.git, https://codeberg.org/inetutils/inetutils/commit/ccba9f748aa8d50a38d7748e2e60362edd6a32cc, https://codeberg.org/inetutils/inetutils/commit/fd702c02497b2f398e739e3119bed0b23dd7aa7b, https://nvd.nist.gov/vuln/detail/CVE-2026-24061</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:195px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24858" target="_blank" rel="noreferrer noopener">CVE-2026-24858</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132px;"><div><p>Fortinet&nbsp;</p></div></td><td style="vertical-align:top;width:123.844px;"><div><p>Multiple Products&nbsp;</p></div></td><td style="vertical-align:top;width:834.156px;"><div><p><a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-060%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-24858%2C%20https%3A//www.fortinet.com/blog/psirt-blogs/analysis-of-sso-abuse-on-fortios" target="_blank" rel="noreferrer noopener">https://fortiguard.fortinet.com/psirt/FG-IR-26-060, https://nvd.nist.gov/vuln/detail/CVE-2026-24858, https://www.fortinet.com/blog/psirt-blogs/analysis-of-sso-abuse-on-fortios</a>&nbsp;</p></div></td></tr></tbody></table><div><div><div style="margin-bottom:2px;"></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:200px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:627px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:86.9531px;"><div><p><strong>Critical&nbsp;</strong></p></div></td><td style="vertical-align:top;width:95.9844px;"><div><p><strong>High&nbsp;</strong></p></div></td><td style="vertical-align:top;width:105px;"><div><p><strong>Medium&nbsp;</strong></p></div></td><td style="vertical-align:top;width:103.938px;"><div><p><strong>Low&nbsp;</strong></p></div></td><td style="vertical-align:top;width:100.875px;"><div><p><strong>Total&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:200px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:627px;"><div><p>ArmorStart&nbsp;LT 290D,ControlLogix&nbsp;Redundancy Enhanced Module Catalog 1756-RM2 Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:86.9531px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:95.9844px;"><div><p>10&nbsp;</p></div></td><td style="vertical-align:top;width:105px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:103.938px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:100.875px;"><div><p>10&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:200px;"><div><p>iba&nbsp;Systems&nbsp;</p></div></td><td style="vertical-align:top;width:627px;"><div><p>ibaPDA&nbsp;</p></div></td><td style="vertical-align:top;width:86.9531px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:95.9844px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:105px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:103.938px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:100.875px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:200px;"><div><p>Johnson Controls&nbsp;</p></div></td><td style="vertical-align:top;width:627px;"><div><p>Metasys Application and Data Server (ADS)&nbsp;</p></div></td><td style="vertical-align:top;width:86.9531px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:95.9844px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:105px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:103.938px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:100.875px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:200px;"><div><p>KiloView&nbsp;</p></div></td><td style="vertical-align:top;width:627px;" class="zp-selected-cell"><div><p>Encoder Series E1 hardware Version 1.4&nbsp;</p></div></td><td style="vertical-align:top;width:86.9531px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:95.9844px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:105px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:103.938px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:100.875px;"><div><p>1&nbsp;</p></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p><p style="margin-bottom:13.3333px;">Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:191px;" class="zp-selected-cell"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:293px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:132.281px;"><div><p><strong>CVSSv3 Score&nbsp;</strong></p></div></td><td style="vertical-align:top;width:152.766px;"><div><p><strong>CVSSv3 Severity&nbsp;</strong></p></div></td><td style="vertical-align:top;width:137.5px;"><div><p><strong>EPSS&nbsp;</strong></p></div></td><td style="vertical-align:top;width:151.859px;"><div><p><strong>Percentile&nbsp;</strong></p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><strong>CWE&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Johnson Controls&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>Metasys Application and Data Server (ADS)&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-26385" target="_blank" rel="noreferrer noopener">CVE-2025-26385</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>10.0&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.599%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>68.871%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/77.html" target="_blank" rel="noreferrer noopener">CWE-77</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>iba&nbsp;Systems&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ibaPDA&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14988" target="_blank" rel="noreferrer noopener">CVE-2025-14988</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.041%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>12.252%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/732.html" target="_blank" rel="noreferrer noopener">CWE-732</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>KiloView&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>Encoder Series E1 hardware Version 1.4&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1453" target="_blank" rel="noreferrer noopener">CVE-2026-1453</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.071%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>21.754%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener">CWE-306</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ControlLogix Redundancy Enhanced Module Catalog 1756-RM2 Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14027" target="_blank" rel="noreferrer noopener">CVE-2025-14027</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.055%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>17.374%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/401.html" target="_blank" rel="noreferrer noopener">CWE-401</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ArmorStart&nbsp;LT 290D&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9278" target="_blank" rel="noreferrer noopener">CVE-2025-9278</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.055%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>17.374%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noreferrer noopener">CWE-400</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ArmorStart&nbsp;LT 290D&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9279" target="_blank" rel="noreferrer noopener">CVE-2025-9279</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.092%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>26.044%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noreferrer noopener">CWE-400</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ArmorStart&nbsp;LT 290D&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9280" target="_blank" rel="noreferrer noopener">CVE-2025-9280</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.055%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>17.374%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noreferrer noopener">CWE-400</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ArmorStart&nbsp;LT 290D&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9281" target="_blank" rel="noreferrer noopener">CVE-2025-9281</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.092%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>26.044%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noreferrer noopener">CWE-400</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ArmorStart&nbsp;LT 290D&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9282" target="_blank" rel="noreferrer noopener">CVE-2025-9282</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.092%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>26.044%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noreferrer noopener">CWE-400</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ArmorStart&nbsp;LT 290D&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9283" target="_blank" rel="noreferrer noopener">CVE-2025-9283</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.092%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>26.044%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noreferrer noopener">CWE-400</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ArmorStart&nbsp;LT 290D&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9464" target="_blank" rel="noreferrer noopener">CVE-2025-9464</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.055%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>17.374%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noreferrer noopener">CWE-400</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ArmorStart&nbsp;LT 290D&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9465" target="_blank" rel="noreferrer noopener">CVE-2025-9465</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.092%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>26.044%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noreferrer noopener">CWE-400</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ArmorStart&nbsp;LT 290D&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9466" target="_blank" rel="noreferrer noopener">CVE-2025-9466</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.092%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>26.044%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noreferrer noopener">CWE-400</a>&nbsp;</p></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br/></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity</span><span><br/></span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" title="- Bilan des Known Exploited Vulnerabilities du mois de décembre 2025" target="_blank" rel="">-</a><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" title="- Bilan des Known Exploited Vulnerabilities du mois de décembre 2025" target="_blank" rel=""> Bilan des Known Exploited Vulnerabilities du mois de décembre 2025</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;février&nbsp;2026 :&nbsp;Construire&nbsp;le plan de protection de&nbsp;ses&nbsp;installations&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/ff70c30b-3a81-44d5-a118-8541407e5699%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5 mars&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;échanges&nbsp;de&nbsp;fichiers&nbsp;entre les zones&nbsp;industrielles&nbsp;et IT, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/7abb2065-6cf1-41bd-956a-9eaaf4655853%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div></div><p style="margin-bottom:13.3333px;"><br/></p></div><br/><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 01 Feb 2026 18:58:51 +0100</pubDate></item></channel></rss>