<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.fortress-cybersecurity.fr/blogs/author/chantal/feed" rel="self" type="application/rss+xml"/><title>Site Institutionnel - Blog by Chantal</title><description>Site Institutionnel - Blog by Chantal</description><link>https://www.fortress-cybersecurity.fr/blogs/author/chantal</link><lastBuildDate>Fri, 13 Mar 2026 22:52:22 +0100</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Bulletin cybersec indus hebdo 25.S51]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-25.s51</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Une nouvelle liste des top 25 CWE de l'année 2025 Une mise à jour de la liste des faiblesses logicielles les plus dangereuses, le top 25 CWE 2025 (ver ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div><div><div><div><strong><span>Une nouvelle liste des top 25 CWE de l'année 2025</span></strong></div>
<div><div style="display:inline;"></div><span>Une mise à jour de la liste des faiblesses logicielles les plus dangereuses, le top 25 CWE 2025 (version 4.19), a été publiée. Elle représente les 25 vulnérabilités parmi les 39080 CVE de cette année. Ce qui diffère par rapport à la liste de l'an dernier concerne le classement de chaque faiblesse. La &quot;CWE-79 : Improper Neutralization of Input During Web Page Generation (‘Cross Site Scripting’)&quot; conserve la première place depuis l'an dernier et la&nbsp; &quot;CWE-862: Missing Authorization&quot; est passée de la 5ème au 4ème rang. Cette liste a été établie à partir des CVE publiées entre le premier juin 2024 et le premier juin 2025, en utilisant une formule de notation qui permet de classer les vulnérabilités selon leur fréquence d'apparition et leur gravité mesurée par le CVSS.</span></div>
</div><a href="https://cwe.mitre.org/news/archives/news2025.html#december11_2025_CWE_Top_25_Now_Available">https://www.dragos.com/blog/dragos-industrial-ransomware-analysis-q3-2025#conclusion</a><div><div><strong></strong><strong><span>Internet Storm Center : Réduction de l'exposition des systèmes industriels et recul des protocoles obsolètes</span>&nbsp;</strong></div>
<div><span>L'Internet Storm Center note pour 2025 une baisse de 10% des systèmes de contrôle industriel (ICS) accessibles publiquement, bien que 100 000 restent exposés. Il est important de souligner que la majorité des systèmes détectés sont des ICS, mais que la majorité sont des &quot;honey pots&quot;. L'article relève également une diminution des serveurs web supportant les protocoles obsolètes SSLv2 et SSLv3. Bien que basées sur des données Shodan, ces observations soulignent une amélioration face aux vulnérabilités communes. L'auteur conclut que ces progrès, souvent éclipsés par l'actualité des cyberattaques, constituent une avancées réelles pour la sécurité globale.</span></div>
<div><a href="https://www.isa.org/getmedia/eaa7e025-c0fa-4cc0-81dd-75dc780bb0f0/Cloud-Computing-in-OT-Environments.pdf" target="_blank" rel="noreferrer noopener"></a><a href="https://isc.sans.edu/diary/Positive%20trends%20related%20to%20public%20IP%20ranges%20from%20the%20year%202025/32584">https://isc.sans.edu/diary/Positive%20trends%20related%20to%20public%20IP%20ranges%20from%20the%20year%202025/32584</a><br/></div><div><div><strong><span><span>Amazon alerte sur la menace du GRU : ciblage d'équipements mal configurés</span></span></strong></div>
<div><span><span><span>Amazon Threat Intelligence (AWS), expose une campagne du GRU (renseignement russe)&nbsp; ciblant les infrastructures critiques occidentales depuis 2021 via des équipements réseau mal configurés. Les attaquants interceptent le trafic pour voler et rejouer les identifiants, en délaissant l'exploitation de vulnérabilités logicielles pour réduire leur exposition. AWS a perturbé ces opérations en notifiant les clients touchés et en alertant les vendeurs concernés. AWS partage des indicateurs de compromission (IOC) soutenir la défense collective et indique la nécéssité de réaliser des audits pour prévenir ces intrusions.</span></span></span></div>
<div><div><div><a href="https://aws.amazon.com/fr/blogs/security/amazon-threat-intelligence-identifies-russian-cyber-threat-group-targeting-western-critical-infrastructure/">https://assets.sophos.com/X24WTUEQ/at/hxjx6q4p3h7xn6hsb3t46tjp/sophos-state-of-ransomware-in-manufacturing-2025.pdf&nbsp;&nbsp;</a></div></div>
<div><span><span style="font-weight:bold;"><span><span>MITRE étend D3FEND à la cybersécurité des systèmes industriels</span></span></span></span></div>
<div><div><span>MITRE a étendu son ontologie de cybersécurité D3FEND aux environnements industriels afin de mieux protéger les systèmes cyber-physiques utilisés dans les infrastructures critiques. Cette extension vise à répondre aux nouveaux risques liés à la connexion croissante des équipements OT aux réseaux et au cloud, alors qu’ils n’ont pas été conçus pour être exposés à Internet. D3FEND pour l’OT fournit un cadre structuré pour modéliser les actifs, les menaces et les contre-mesures spécifiques aux environnements industriels. L’objectif est d’aider les équipes OT et cyber à mieux comprendre les attaques, détecter les comportements malveillants et sécuriser les processus critiques.</span></div>
<div><div><a href="https://www.mitre.org/news-insights/news-release/mitre-extends-d3fend-ontology-operational-technology-cybersecurity">https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-343a?utm_source=https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-343a&amp;utm_medium=GovDelivery</a></div>
<div><span style="font-weight:bold;"><br/></span></div><div><span style="font-weight:bold;">Vulnerability&nbsp;Corner :</span>&nbsp;</div><div><div><div><p style="margin-bottom:13.3333px;">Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</p></div>
<div><div><div style="clear:both;overflow:visible;direction:ltr;"><div><p style="margin-bottom:13.3333px;"></p><div><table border="1"><tbody><tr><td style="vertical-align:top;width:189px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:136.125px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:228.734px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:759.266px;"><div><p><strong>Liens&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:189px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14611" target="_blank" rel="noreferrer noopener">CVE-2025-14611</a>&nbsp;</p></div></td><td style="vertical-align:top;width:136.125px;"><div><p>Gladinet&nbsp;</p></div></td><td style="vertical-align:top;width:228.734px;"><div><p>CentreStack&nbsp;and&nbsp;Triofox&nbsp;</p></div></td><td style="vertical-align:top;width:759.266px;"><div><p><a href="https://access.triofox.com/releases_history/%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-14611%2C%20https%3A//support.centrestack.com/hc/en-us/articles/360007159054-Hardening-the-CentreStack-Cluster#h_01JQRV57T37HJFQZKBZH9NBXQP%2C%20https://www.centrestack.com/p/gce_latest_release.html" target="_blank" rel="noreferrer noopener">https://access.triofox.com/releases_history/, https://nvd.nist.gov/vuln/detail/CVE-2025-14611, https://support.centrestack.com/hc/en-us/articles/360007159054-Hardening-the-CentreStack-Cluster#h_01JQRV57T37HJFQZKBZH9NBXQP, https://www.centrestack.com/p/gce_latest_release.html</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:189px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14733" target="_blank" rel="noreferrer noopener">CVE-2025-14733</a>&nbsp;</p></div></td><td style="vertical-align:top;width:136.125px;"><div><p>WatchGuard&nbsp;</p></div></td><td style="vertical-align:top;width:228.734px;"><div><p>Firebox&nbsp;</p></div></td><td style="vertical-align:top;width:759.266px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14733%2C%20https%3A//www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00027" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2025-14733, https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00027</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:189px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-20393" target="_blank" rel="noreferrer noopener">CVE-2025-20393</a>&nbsp;</p></div></td><td style="vertical-align:top;width:136.125px;"><div><p>Cisco&nbsp;</p></div></td><td style="vertical-align:top;width:228.734px;"><div><p>Multiple Products&nbsp;</p></div></td><td style="vertical-align:top;width:759.266px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-20393%2C%20https%3A//sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-attack-N9bf4" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2025-20393, https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-attack-N9bf4</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:189px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40602" target="_blank" rel="noreferrer noopener">CVE-2025-40602</a>&nbsp;</p></div></td><td style="vertical-align:top;width:136.125px;"><div><p>SonicWall&nbsp;</p></div></td><td style="vertical-align:top;width:228.734px;"><div><p>SMA1000 appliance&nbsp;</p></div></td><td style="vertical-align:top;width:759.266px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40602%2C%20https%3A//psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0019" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2025-40602, https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0019</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:189px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-43529" target="_blank" rel="noreferrer noopener">CVE-2025-43529</a>&nbsp;</p></div></td><td style="vertical-align:top;width:136.125px;"><div><p>Apple&nbsp;</p></div></td><td style="vertical-align:top;width:228.734px;"><div><p>Multiple Products&nbsp;</p></div></td><td style="vertical-align:top;width:759.266px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-43529%2C%20https%3A//support.apple.com/en-us/125884%2C%20https%3A//support.apple.com/en-us/125885%2C%20https%3A//support.apple.com/en-us/125886%2C%20https%3A//support.apple.com/en-us/125889%2C%20https%3A//support.apple.com/en-us/125892" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2025-43529, https://support.apple.com/en-us/125884, https://support.apple.com/en-us/125885, https://support.apple.com/en-us/125886, https://support.apple.com/en-us/125889, https://support.apple.com/en-us/125892</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:189px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59374" target="_blank" rel="noreferrer noopener">CVE-2025-59374</a>&nbsp;</p></div></td><td style="vertical-align:top;width:136.125px;"><div><p>ASUS&nbsp;</p></div></td><td style="vertical-align:top;width:228.734px;"><div><p>Live Update&nbsp;</p></div></td><td style="vertical-align:top;width:759.266px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59374%2C%20https%3A//www.asus.com/support/faq/1018727/" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2025-59374, https://www.asus.com/support/faq/1018727/</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:189px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59718" target="_blank" rel="noreferrer noopener">CVE-2025-59718</a>&nbsp;</p></div></td><td style="vertical-align:top;width:136.125px;"><div><p>Fortinet&nbsp;</p></div></td><td style="vertical-align:top;width:228.734px;"><div><p>Multiple Products&nbsp;</p></div></td><td style="vertical-align:top;width:759.266px;"><div><p><a href="https://docs.fortinet.com/upgrade-tool/fortigate%2C%20https%3A//fortiguard.fortinet.com/psirt/FG-IR-25-647%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-59718" target="_blank" rel="noreferrer noopener">https://docs.fortinet.com/upgrade-tool/fortigate, https://fortiguard.fortinet.com/psirt/FG-IR-25-647, https://nvd.nist.gov/vuln/detail/CVE-2025-59718</a>&nbsp;</p></div></td></tr></tbody></table></div><br/><p></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span>&nbsp;</p></div>
<div><div><div><table border="1"><tbody><tr><td style="vertical-align:top;width:373px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:353px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:155.094px;"><div><p><strong>Critical&nbsp;</strong></p></div></td><td style="vertical-align:top;width:132.406px;"><div><p><strong>High&nbsp;</strong></p></div></td><td style="vertical-align:top;width:134.266px;"><div><p><strong>Medium&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Low&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Total&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:373px;"><div><p>National Instruments&nbsp;</p></div></td><td style="vertical-align:top;width:353px;"><div><p>LabVIEW&nbsp;</p></div></td><td style="vertical-align:top;width:155.094px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:132.406px;"><div><p>9&nbsp;</p></div></td><td style="vertical-align:top;width:134.266px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>9&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:373px;"><div><p>Advantech&nbsp;</p></div></td><td style="vertical-align:top;width:353px;"><div><p>WebAccess/SCADA&nbsp;</p></div></td><td style="vertical-align:top;width:155.094px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:132.406px;"><div><p>2&nbsp;</p></div></td><td style="vertical-align:top;width:134.266px;"><div><p>3&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>5&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:373px;"><div><p>Johnson Controls Inc.&nbsp;</p></div></td><td style="vertical-align:top;width:353px;"><div><p>PowerG&nbsp;</p></div></td><td style="vertical-align:top;width:155.094px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:132.406px;"><div><p>3&nbsp;</p></div></td><td style="vertical-align:top;width:134.266px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>4&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:373px;"><div><p>Axis Communications&nbsp;</p></div></td><td style="vertical-align:top;width:353px;"><div><p>AXIS Camera Station Pro&nbsp;</p></div></td><td style="vertical-align:top;width:155.094px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:132.406px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:134.266px;"><div><p>3&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>4&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:373px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:353px;"><div><p>Micro820&nbsp;</p></div></td><td style="vertical-align:top;width:155.094px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:132.406px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:134.266px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>2&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:373px;"><div><p>Inductive Automation&nbsp;</p></div></td><td style="vertical-align:top;width:353px;"><div><p>Ignition&nbsp;</p></div></td><td style="vertical-align:top;width:155.094px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:132.406px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:134.266px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:373px;"><div><p>Hitachi Energy&nbsp;</p></div></td><td style="vertical-align:top;width:353px;"><div><p>AFS 660-B/C/S&nbsp;</p></div></td><td style="vertical-align:top;width:155.094px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:132.406px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:134.266px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:373px;"><div><p>Mitsubishi Electric&nbsp;</p></div></td><td style="vertical-align:top;width:353px;"><div><p>GT Designer3 Version1 (GOT2000)&nbsp;</p></div></td><td style="vertical-align:top;width:155.094px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:132.406px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:134.266px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:373px;"><div><p>Mitsubishi Electric&nbsp;Iconics&nbsp;Digital Solutions, Mitsubishi Electric&nbsp;</p></div></td><td style="vertical-align:top;width:353px;"><div><p>GENESIS64&nbsp;</p></div></td><td style="vertical-align:top;width:155.094px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:132.406px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:134.266px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:373px;"><div><p>Güralp&nbsp;Systems&nbsp;</p></div></td><td style="vertical-align:top;width:353px;"><div><p>Fortimus&nbsp;Series&nbsp;</p></div></td><td style="vertical-align:top;width:155.094px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:132.406px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:134.266px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr></tbody></table></div><br/>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</div></div>
<div><p style="margin-bottom:13.3333px;"></p><div><div><table border="1"><tbody><tr><td style="vertical-align:top;width:342px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:199px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:109.438px;"><div><p><strong>CVSSv3 Score&nbsp;</strong></p></div></td><td style="vertical-align:top;width:124.453px;"><div><p><strong>CVSSv3 Severity&nbsp;</strong></p></div></td><td style="vertical-align:top;width:125.438px;"><div><p><strong>EPSS&nbsp;</strong></p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p><strong>Percentile&nbsp;</strong></p></div></td><td style="vertical-align:top;width:104.844px;" class="zp-selected-cell"><div><p><strong>CWE&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Axis Communications&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>AXIS Camera Station Pro&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-30023" target="_blank" rel="noreferrer noopener">CVE-2025-30023</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>9.0&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>1.916%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>82.831%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/502.html" target="_blank" rel="noreferrer noopener">CWE-502</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Hitachi Energy&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>AFS 660-B/C/S&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3596" target="_blank" rel="noreferrer noopener">CVE-2024-3596</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>9.0&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>19.021%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>95.115%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/924.html" target="_blank" rel="noreferrer noopener">CWE-924</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Advantech&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>WebAccess/SCADA&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14849" target="_blank" rel="noreferrer noopener">CVE-2025-14849</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>8.8&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.055%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>17.422%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/434.html" target="_blank" rel="noreferrer noopener">CWE-434</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Mitsubishi Electric&nbsp;Iconics&nbsp;Digital Solutions, Mitsubishi Electric&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>GENESIS64&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11774" target="_blank" rel="noreferrer noopener">CVE-2025-11774</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>8.2&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.032%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>8.694%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener">CWE-78</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Advantech&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>WebAccess/SCADA&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14850" target="_blank" rel="noreferrer noopener">CVE-2025-14850</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>8.1&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.253%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>48.442%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/22.html" target="_blank" rel="noreferrer noopener">CWE-22</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>National Instruments&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>LabVIEW&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64461" target="_blank" rel="noreferrer noopener">CVE-2025-64461</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.015%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>2.350%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/787.html" target="_blank" rel="noreferrer noopener">CWE-787</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>National Instruments&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>LabVIEW&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64462" target="_blank" rel="noreferrer noopener">CVE-2025-64462</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.015%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>2.350%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener">CWE-125</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>National Instruments&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>LabVIEW&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64463" target="_blank" rel="noreferrer noopener">CVE-2025-64463</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.015%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>2.350%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener">CWE-125</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>National Instruments&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>LabVIEW&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64464" target="_blank" rel="noreferrer noopener">CVE-2025-64464</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.015%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>2.350%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener">CWE-125</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>National Instruments&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>LabVIEW&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64465" target="_blank" rel="noreferrer noopener">CVE-2025-64465</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.015%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>2.350%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener">CWE-125</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>National Instruments&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>LabVIEW&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64466" target="_blank" rel="noreferrer noopener">CVE-2025-64466</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.015%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>2.350%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener">CWE-125</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>National Instruments&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>LabVIEW&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64467" target="_blank" rel="noreferrer noopener">CVE-2025-64467</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.015%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>2.350%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener">CWE-125</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>National Instruments&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>LabVIEW&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64468" target="_blank" rel="noreferrer noopener">CVE-2025-64468</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.015%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>2.350%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/416.html" target="_blank" rel="noreferrer noopener">CWE-416</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>National Instruments&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>LabVIEW&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64469" target="_blank" rel="noreferrer noopener">CVE-2025-64469</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.015%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>2.350%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/121.html" target="_blank" rel="noreferrer noopener">CWE-121</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Johnson Controls Inc.&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>PowerG&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-26379" target="_blank" rel="noreferrer noopener">CVE-2025-26379</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>7.6&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/338.html" target="_blank" rel="noreferrer noopener">CWE-338</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Johnson Controls Inc.&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>PowerG&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61739" target="_blank" rel="noreferrer noopener">CVE-2025-61739</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>7.6&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/323.html" target="_blank" rel="noreferrer noopener">CWE-323</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Johnson Controls Inc.&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>PowerG&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61740" target="_blank" rel="noreferrer noopener">CVE-2025-61740</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>7.6&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/346.html" target="_blank" rel="noreferrer noopener">CWE-346</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>Micro820&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13824" target="_blank" rel="noreferrer noopener">CVE-2025-13824</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.055%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>17.529%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/763.html" target="_blank" rel="noreferrer noopener">CWE-763</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Axis Communications&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>AXIS Camera Station Pro&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-30024" target="_blank" rel="noreferrer noopener">CVE-2025-30024</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>6.8&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.026%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>6.495%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/295.html" target="_blank" rel="noreferrer noopener">CWE-295</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>Micro820&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13823" target="_blank" rel="noreferrer noopener">CVE-2025-13823</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>6.5&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.020%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>4.555%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/1395.html" target="_blank" rel="noreferrer noopener">CWE-1395</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Inductive Automation&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>Ignition&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13911" target="_blank" rel="noreferrer noopener">CVE-2025-13911</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>6.4&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.013%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>1.564%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/250.html" target="_blank" rel="noreferrer noopener">CWE-250</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Advantech&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>WebAccess/SCADA&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-46268" target="_blank" rel="noreferrer noopener">CVE-2025-46268</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>6.3&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.026%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>6.603%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/89.html" target="_blank" rel="noreferrer noopener">CWE-89</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Axis Communications&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>AXIS Camera Station Pro&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-30026" target="_blank" rel="noreferrer noopener">CVE-2025-30026</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>6.1&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.034%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>9.780%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/288.html" target="_blank" rel="noreferrer noopener">CWE-288</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Güralp&nbsp;Systems&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>Fortimus&nbsp;Series&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14466" target="_blank" rel="noreferrer noopener">CVE-2025-14466</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>5.3&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.091%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>26.321%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/770.html" target="_blank" rel="noreferrer noopener">CWE-770</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Johnson Controls Inc.&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>PowerG&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61738" target="_blank" rel="noreferrer noopener">CVE-2025-61738</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>5.3&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/319.html" target="_blank" rel="noreferrer noopener">CWE-319</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Axis Communications&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>AXIS Camera Station Pro&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-30025" target="_blank" rel="noreferrer noopener">CVE-2025-30025</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>5.2&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.037%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>10.628%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/502.html" target="_blank" rel="noreferrer noopener">CWE-502</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Mitsubishi Electric&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>GT Designer3 Version1 (GOT2000)&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11009" target="_blank" rel="noreferrer noopener">CVE-2025-11009</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>5.1&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.013%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>1.492%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/312.html" target="_blank" rel="noreferrer noopener">CWE-312</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Advantech&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>WebAccess/SCADA&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14848" target="_blank" rel="noreferrer noopener">CVE-2025-14848</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>4.3&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.042%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>12.701%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/36.html" target="_blank" rel="noreferrer noopener">CWE-36</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Advantech&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>WebAccess/SCADA&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67653" target="_blank" rel="noreferrer noopener">CVE-2025-67653</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>4.3&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.042%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>12.701%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/22.html" target="_blank" rel="noreferrer noopener">CWE-22</a>&nbsp;</p></div></td></tr></tbody></table></div><br/></div><p></p></div></div><div style="clear:both;overflow:visible;direction:ltr;"><div><p style="margin-bottom:13.3333px;">-----&nbsp;</p><p style="margin-bottom:13.3333px;"><strong></strong></p><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Actualité Fortress Cybersecurity </span>&nbsp;<br/></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-juin-2025" target="_blank" rel="noreferrer noopener"></a><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-d-octobre-2025" target="_blank" rel="noreferrer noopener"></a></p></div>
</div></div></div></div><div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-novembre-2025" target="_blank" rel="noreferrer noopener">- Bilan des Known Exploited Vulnerabilities du mois de novembre 2025</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener">- Nouveau guide de classification des actifs industriels publié par l'ANSSI</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener">Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 8 janvier 2026 : Définir sa stratégie de détection en environnement industriel, inscription <a href="https://events.teams.microsoft.com/event/591f0891-1fda-4029-9812-497ae82c48ff%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 6 février 2026 : Construire le plan de protection de ses installations industrielles, inscription <a href="https://events.teams.microsoft.com/event/ff70c30b-3a81-44d5-a118-8541407e5699%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 5 mars 2026 : Sécuriser les échanges de fichiers entre les zones industrielles et IT, inscription <a href="https://events.teams.microsoft.com/event/7abb2065-6cf1-41bd-956a-9eaaf4655853%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 9 avril 2026 : NIS 2 pour l’industrie​, inscription <a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 7 mai 2026 : Segmenter les réseaux industriels​, inscription <a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 4 juin 2026 : Gérer les incidents cyber en environnement industriel​, inscription <a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 2 juillet 2026 : Gérer les vulnérabilités en environnement industriel​​, inscription <a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 3 septembre 2026 : Mettre en place le plan de contrôle cyber de ses installations industriels​​, inscription <a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 1 octobre 2026 : Sécuriser les accès à distance et de télémaintenance des actifs industriels, inscription <a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 5 novembre 2026 : Protéger les endpoints dans les zones industrielles, inscription <a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 3 décembre 2026 : Protéger les réseaux mobiles privés 5G, inscription <a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
</div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div></div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div></div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div><div><div><div><div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div></div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div></div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div><div><div><div><div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div></div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div></div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 21 Dec 2025 22:35:13 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 25.S50]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-25.s50</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/> Augmentation des attaques par rançongiciels contre les systèmes industriels ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div><div><div><div><strong>Augmentation des attaques par rançongiciels contre les systèmes industriels en 2025</strong></div>
<div><div style="display:inline;"></div>Selon l'étude de Dragos, entre juillet et septembre 2025, les attaques de rançongiciels contre les systèmes industriels ont augmenté, avec 742 incidents par ransomware. Les régions les plus touchées sont l'Amérique du Nord et l'Europe. Le secteur manufacturier est le plus visé avec 72 % des incidents. Le sous-secteur manufacturier le plus affecté par les rançongiciels était la construction, avec 142 incidents. Le groupe Quilin était le plus actif avec 138 incidents. Ce groupe a exploité des vulnérabilités de Fortinet, notamment la CVE-2024-55591 et la CVE-2024-21762, permettant un accès non authentifié et l'exécution de code à distance sur les équipements FortiGate et FortiProxy. Ainsi, d'autres groupes comme Lapsus$ Hunters qui a ciblé Jaguar Land Rover (JLR), en provoquant des arrêts de production de plusieurs jours dans les usines.&nbsp; </div>
</div><a href="https://www.cisa.gov/resources-tools/resources/principles-secure-integration-artificial-intelligence-operational-technology?utm_source=PrinciplesSecureIntegration&amp;utm_medium=GovDelivery"></a><a href="https://www.dragos.com/blog/dragos-industrial-ransomware-analysis-q3-2025#conclusion" target="_blank" rel="noreferrer noopener"><span style="font-weight:bold;"><strong>https://www.dragos.com/blog/dragos-industrial-ransomware-analysis-q3-2025#conclusion</strong></span></a><strong></strong>&nbsp; <div><div><strong></strong><strong>NIST : segmentation du réseau pour protéger le secteur manufacturier&nbsp;</strong></div>
<div> Le document NIST &quot;Security Segmentation in a Small Manufacturing Environment&quot; montre comment le secteur manufacturier peut protéger ses systèmes en mettant en œuvre la segmentation des réseaux pour limiter la propagation des acteurs de menaces. Il recommande de séparer les environnements IT et les systèmes industriels, de contrôler les accès et de créer des zones de sécurité, regroupant des actifs qui partagent les mêmes fonctions opérationnelles et le même niveau de protection, pouvant communiquer entre eux. Par exemple, la zone de sécurité &quot;système de gestion des infrastructures&quot;, contient les applications et systèmes utilisés pour la configuration, la mise à jour et la surveillance, tandis qu’une autre zone, &quot;services de connectivité&quot;, inclut les routeurs et le VPN.&nbsp;&nbsp; </div>
<div><a href="https://www.isa.org/getmedia/eaa7e025-c0fa-4cc0-81dd-75dc780bb0f0/Cloud-Computing-in-OT-Environments.pdf" target="_blank" rel="noreferrer noopener"></a><div><a href="https://www.isa.org/getmedia/eaa7e025-c0fa-4cc0-81dd-75dc780bb0f0/Cloud-Computing-in-OT-Environments.pdf" target="_blank" rel="noreferrer noopener"></a><a href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.28.pdf" target="_blank" rel="noreferrer noopener"><span style="font-weight:bold;"><strong>https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.28.pdf</strong></span></a>&nbsp; </div>
</div><div><div><strong><span>Les ransomwares dans l'indutrie</span></strong></div>
<div><span><span>Sophos (société de logiciel américaine) publie son 5ème rapport sur le ransomware manufacturier en 2025, sondant 332 responsables informatiques sur les vecteurs d'attaque et tendances financières. Il révèle un coût de recouvrement de 1,3M$ et une rançon moyenne de 1 M$ (baisse de 20 % liée au recul de la tranche 1-5M$). L'étude met en lumière les progrès en matière de détection et les défis comme le manque d'expertise interne. L'objectif est de fournir des données et des recommandations pour aider à implémenter leurs stratégies de défense et de réponse aux incidents.</span></span></div>
<div><div><a href="https://socradar.io/blog/cisa-industrial-control-systems-ics-advisories-2025/" target="_blank" rel="noreferrer noopener"></a><a href="https://assets.sophos.com/X24WTUEQ/at/hxjx6q4p3h7xn6hsb3t46tjp/sophos-state-of-ransomware-in-manufacturing-2025.pdf" target="_blank" rel="noreferrer noopener"><strong>https://assets.sophos.com/X24WTUEQ/at/hxjx6q4p3h7xn6hsb3t46tjp/sophos-state-of-ransomware-in-manufacturing-2025.pdf</strong></a>&nbsp; </div>
<div><span><span style="font-weight:bold;"><span>Menaces des hacktivistes pro-russes sur les infrastructures critiques</span></span></span></div>
<div><div> Dans cet article, l'agence américaine de cybersécurité CISA , alerte les opérateurs d'infrastructures critiques sur la menace des hacktivistes pro-russes ciblant les technologies opérationnelles et les systèmes de contrôle industriels aux États-Unis et dans le monde. Dans cette publication, l'agence détaille les méthodes d'intrusion, notamment l'exploitation des accès VNC (virtual network computing), afin d'inciter les organisations à adopter des mesures pour prévenir les dommages physiques et les interruptions de service. </div>
<div><div><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-343a?utm_source=https%3A%2F%2Fwww.cisa.gov%2Fnews-events%2Fcybersecurity-advisories%2Faa25-343a&amp;utm_medium=GovDelivery" target="_blank" rel="noreferrer noopener"><strong>https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-343a?utm_source=https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-343a&amp;utm_medium=GovDelivery</strong></a></div>
<div><span><span style="font-weight:bold;"><span>Storm-0249 : Exploitation des EDR tout en restant invisibles</span></span></span></div>
<div> Storm-0249, un broker d’accès initial, a fortement fait évoluer ses méthodes en passant du phishing de masse à des attaques plus ciblées. Le groupe abuse désormais de processus légitimes d’EDR, SentinelOne en l'occurrence, pour exécuter du code malveillant. Grâce à des techniques comme le DLL sideloading et l’exécution fileless, leurs actions ressemblent à de l’activité normale des outils de sécurité. Cette approche leur permet de rester invisibles plus longtemps, de déployer des ransomwares et de rendre les actions de remédiation classiques inefficaces. Ces techniques peuvent affecter d'autres solutions d'EDR. </div>
<div><div><a href="https://reliaquest.com/blog/threat-spotlight-storm-0249-precision-endpoint-exploitation/" target="_blank" rel="noreferrer noopener"><strong>https://reliaquest.com/blog/threat-spotlight-storm-0249-precision-endpoint-exploitation/</strong></a> &nbsp; <br/><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><br/></span></p><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnerability&nbsp;Corner :</span>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</p></div>
<div><div><div style="clear:both;overflow:visible;direction:ltr;"><div><p style="margin-bottom:13.3333px;"></p><div><table border="1"><tbody><tr><td style="vertical-align:top;width:144px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:144px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:144px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:144px;"><div><p><strong>Liens&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-37055" target="_blank" rel="noreferrer noopener">CVE-2022-37055</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>D-Link&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Routers&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-37055%2C%20https%3A//supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10308" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2022-37055, https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10308</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58360" target="_blank" rel="noreferrer noopener">CVE-2025-58360</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>OSGeo&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>GeoServer&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="https://github.com/geoserver/geoserver/security/advisories/GHSA-fjf5-xgmq-5525%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-58360%2C%20https%3A//osgeo-org.atlassian.net/browse/GEOS-11922" target="_blank" rel="noreferrer noopener">https://github.com/geoserver/geoserver/security/advisories/GHSA-fjf5-xgmq-5525, https://nvd.nist.gov/vuln/detail/CVE-2025-58360, https://osgeo-org.atlassian.net/browse/GEOS-11922</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-6218" target="_blank" rel="noreferrer noopener">CVE-2025-6218</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>RARLAB&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>WinRAR&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-6218%2C%20https%3A//www.win-rar.com/singlenewsview.html?&amp;L=0&amp;tx_ttnews%5Btt_news%5D=276&amp;cHash=b5165454d983fc9717bc8748901a64f9" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2025-6218, https://www.win-rar.com/singlenewsview.html?&amp;L=0&amp;tx_ttnews%5Btt_news%5D=276&amp;cHash=b5165454d983fc9717bc8748901a64f9</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-62221" target="_blank" rel="noreferrer noopener">CVE-2025-62221</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Microsoft&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Windows&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-62221%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-62221" target="_blank" rel="noreferrer noopener">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-62221, https://nvd.nist.gov/vuln/detail/CVE-2025-62221</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66644" target="_blank" rel="noreferrer noopener">CVE-2025-66644</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Array Networks&nbsp;&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>ArrayOS AG&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66644%2C%20https%3A//support.arraynetworks.net/prx/001/http/supportportal.arraynetworks.net/ag.html%2C%20https%3A//www.jpcert.or.jp/at/2025/at250024.html" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2025-66644, https://support.arraynetworks.net/prx/001/http/supportportal.arraynetworks.net/ag.html, https://www.jpcert.or.jp/at/2025/at250024.html</a>&nbsp;</p></div></td></tr></tbody></table></div>
<br/><p></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span>&nbsp;</p></div>
<div><div><div><table border="1"><tbody><tr><td style="vertical-align:top;width:82px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Critical&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>High&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Medium&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Low&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Total</strong>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Siemens&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Building X - Security Manager Edge Controller (ACC-AP),COMOS V10.6,Energy Services,Gridscale X Prepay,SINEMA Remote Connect Server&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>2&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>5&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>8&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>AzeoTech&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>DAQFactory&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>7&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>7&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Johnson Controls Inc.&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>iSTAR Ultra&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>2&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>2&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Johnson Controls&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>iSTAR Ultra&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>2&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>2&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Grassroots&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Grassroots DICOM (GDCM)&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>OpenPLC_V3&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>OpenPLC_V3&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>D-Link (India Limited)&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>DCS-F5614-L1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>U-Boot&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>U-boot&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Varex Imaging&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Panoramic Dental Imaging Software&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr></tbody></table></div>
<br/><br/></div>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp; </div>
<div><p style="margin-bottom:13.3333px;"></p><div><div><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVSSv3 Score&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVSSv3 Severity&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>EPSS&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>Percentile&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CWE&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>D-Link (India Limited)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>DCS-F5614-L1&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13607" target="_blank" rel="noreferrer noopener">CVE-2025-13607</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.4&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.042%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>12.674%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener">CWE-306</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Johnson Controls&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>iSTAR Ultra&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-43873" target="_blank" rel="noreferrer noopener">CVE-2025-43873</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener">CWE-78</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Johnson Controls&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>iSTAR Ultra&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-43874" target="_blank" rel="noreferrer noopener">CVE-2025-43874</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener">CWE-78</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Johnson Controls Inc.&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>iSTAR Ultra&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-43875" target="_blank" rel="noreferrer noopener">CVE-2025-43875</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener">CWE-78</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Johnson Controls Inc.&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>iSTAR Ultra&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-43876" target="_blank" rel="noreferrer noopener">CVE-2025-43876</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener">CWE-78</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>U-Boot&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>U-boot&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24857" target="_blank" rel="noreferrer noopener">CVE-2025-24857</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.4&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.020%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>4.391%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/1274.html" target="_blank" rel="noreferrer noopener">CWE-1274</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Siemens&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>COMOS V10.6&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40801" target="_blank" rel="noreferrer noopener">CVE-2025-40801</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.1&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.020%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>4.595%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/295.html" target="_blank" rel="noreferrer noopener">CWE-295</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>OpenPLC_V3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>OpenPLC_V3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13970" target="_blank" rel="noreferrer noopener">CVE-2025-13970</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.0&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/352.html" target="_blank" rel="noreferrer noopener">CWE-352</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>AzeoTech&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>DAQFactory&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66584" target="_blank" rel="noreferrer noopener">CVE-2025-66584</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/121.html" target="_blank" rel="noreferrer noopener">CWE-121</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>AzeoTech&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>DAQFactory&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66585" target="_blank" rel="noreferrer noopener">CVE-2025-66585</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/416.html" target="_blank" rel="noreferrer noopener">CWE-416</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>AzeoTech&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>DAQFactory&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66586" target="_blank" rel="noreferrer noopener">CVE-2025-66586</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/843.html" target="_blank" rel="noreferrer noopener">CWE-843</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>AzeoTech&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>DAQFactory&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66587" target="_blank" rel="noreferrer noopener">CVE-2025-66587</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/122.html" target="_blank" rel="noreferrer noopener">CWE-122</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>AzeoTech&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>DAQFactory&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66588" target="_blank" rel="noreferrer noopener">CVE-2025-66588</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/824.html" target="_blank" rel="noreferrer noopener">CWE-824</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>AzeoTech&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>DAQFactory&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66589" target="_blank" rel="noreferrer noopener">CVE-2025-66589</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener">CWE-125</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>AzeoTech&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>DAQFactory&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66590" target="_blank" rel="noreferrer noopener">CVE-2025-66590</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/787.html" target="_blank" rel="noreferrer noopener">CWE-787</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Varex Imaging&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Panoramic Dental Imaging Software&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-22774" target="_blank" rel="noreferrer noopener">CVE-2024-22774</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>3.913%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>87.889%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/427.html" target="_blank" rel="noreferrer noopener">CWE-427</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Siemens&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>COMOS V10.6&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40800" target="_blank" rel="noreferrer noopener">CVE-2025-40800</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.4&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.015%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>2.163%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/295.html" target="_blank" rel="noreferrer noopener">CWE-295</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Siemens&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Energy Services&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59392" target="_blank" rel="noreferrer noopener">CVE-2025-59392</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.026%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6.345%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/288.html" target="_blank" rel="noreferrer noopener">CWE-288</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Grassroots&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Grassroots DICOM (GDCM)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11266" target="_blank" rel="noreferrer noopener">CVE-2025-11266</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6.6&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/787.html" target="_blank" rel="noreferrer noopener">CWE-787</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Siemens&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Gridscale X Prepay&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40807" target="_blank" rel="noreferrer noopener">CVE-2025-40807</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6.3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.043%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>13.206%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/294.html" target="_blank" rel="noreferrer noopener">CWE-294</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Siemens&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Building X - Security Manager Edge Controller (ACC-AP)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-31807" target="_blank" rel="noreferrer noopener">CVE-2022-31807</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6.2&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.016%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>2.824%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/347.html" target="_blank" rel="noreferrer noopener">CWE-347</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Siemens&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Gridscale X Prepay&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40806" target="_blank" rel="noreferrer noopener">CVE-2025-40806</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>5.3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.029%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.669%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/204.html" target="_blank" rel="noreferrer noopener">CWE-204</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Siemens&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>SINEMA Remote Connect Server&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40819" target="_blank" rel="noreferrer noopener">CVE-2025-40819</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>4.3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.028%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.136%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/863.html" target="_blank" rel="noreferrer noopener">CWE-863</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Siemens&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>SINEMA Remote Connect Server&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40818" target="_blank" rel="noreferrer noopener">CVE-2025-40818</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>3.3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>LOW&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.008%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.533%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/732.html" target="_blank" rel="noreferrer noopener">CWE-732</a>&nbsp;</p></div></td></tr></tbody></table></div>
<br/></div><p></p></div></div><div style="clear:both;overflow:visible;direction:ltr;"><div><p style="margin-bottom:13.3333px;">-----&nbsp;</p><p style="margin-bottom:13.3333px;"><strong></strong></p><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Actualité Fortress Cybersecurity </span>&nbsp;<br/></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-juin-2025" target="_blank" rel="noreferrer noopener"></a><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-d-octobre-2025" target="_blank" rel="noreferrer noopener"></a></p></div>
</div></div></div></div><div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-novembre-2025" target="_blank" rel="noreferrer noopener">- Bilan des Known Exploited Vulnerabilities du mois de novembre 2025</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener">- Nouveau guide de classification des actifs industriels publié par l'ANSSI</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener">Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 8 janvier 2026 : Définir sa stratégie de détection en environnement industriel, inscription <a href="https://events.teams.microsoft.com/event/591f0891-1fda-4029-9812-497ae82c48ff%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 6 février 2026 : Construire le plan de protection de ses installations industrielles, inscription <a href="https://events.teams.microsoft.com/event/ff70c30b-3a81-44d5-a118-8541407e5699%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 5 mars 2026 : Sécuriser les échanges de fichiers entre les zones industrielles et IT, inscription <a href="https://events.teams.microsoft.com/event/7abb2065-6cf1-41bd-956a-9eaaf4655853%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 9 avril 2026 : NIS 2 pour l’industrie​, inscription <a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 7 mai 2026 : Segmenter les réseaux industriels​, inscription <a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 4 juin 2026 : Gérer les incidents cyber en environnement industriel​, inscription <a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 2 juillet 2026 : Gérer les vulnérabilités en environnement industriel​​, inscription <a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 3 septembre 2026 : Mettre en place le plan de contrôle cyber de ses installations industriels​​, inscription <a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 1 octobre 2026 : Sécuriser les accès à distance et de télémaintenance des actifs industriels, inscription <a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 5 novembre 2026 : Protéger les endpoints dans les zones industrielles, inscription <a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 3 décembre 2026 : Protéger les réseaux mobiles privés 5G, inscription <a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
</div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div></div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div></div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div><div><div><div><div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div></div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div></div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div><div><div><div><div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div></div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div></div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 14 Dec 2025 21:34:48 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 25.S49]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-25.s49</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Intégration sécurisée de l'IA dans les systèmes industriels&nbsp; Différentes agences ont publié un guide intitulé &quot;Principles for the Secure Int ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div><div><div><strong>Intégration sécurisée de l'IA dans les systèmes industriels&nbsp;</strong></div></div><div><div style="display:inline;">Différentes agences</div>
 ont publié un guide intitulé &quot;Principles for the Secure Integration of Artificial Intelligence in Operational Technology&quot;. Ce document montre les avantages de l'intégration de l'intelligence artificielle dans les systèmes industriels. Il présente quatre clés principales : comprendre les risques liés à l’intégration de l’IA et former le personnel, gérer les risques concernant la sécurité des données industrielles et le rôle des fournisseurs, encourager l’intégration de l’IA tout en respectant les exigences réglementaires et intégrer l’IA dans les plans de réponse aux incidents.&nbsp;</div></div><span><span><a href="https://www.cisa.gov/resources-tools/resources/principles-secure-integration-artificial-intelligence-operational-technology?utm_source=PrinciplesSecureIntegration&amp;utm_medium=GovDelivery">https://www.cisa.gov/resources-tools/resources/principles-secure-integration-artificial-intelligence-operational-technology?utm_source=PrinciplesSecureIntegration&amp;utm_medium=GovDelivery</a></span></span><div><div><strong>Intégration du cloud dans un système industriel</strong>&nbsp;</div><div><span>Dans cet article, l'ISA (International Society of Automation) délimite l'usage du Cloud dans le domaine industriel. Elle le juge inadapté au contrôle en temps réel mais intéressant pour l'analyse de données, la gestion à distance et une meilleure collaboration. L'usage du cloud représente des défis techniques, notamment la cybersécurité, la latence et la compatibilité avec les systèmes existants. Enfin, l'ISA recommande aux acteurs industriels de s'appuyer sur des standards, comme l'ISA/IEC 62443, pour garantir une intégration sécurisée.&nbsp;</span></div><div><span><a href="https://www.isa.org/getmedia/eaa7e025-c0fa-4cc0-81dd-75dc780bb0f0/Cloud-Computing-in-OT-Environments.pdf" target="_blank" rel="noreferrer noopener"><span>https://www.isa.org/getmedia/eaa7e025-c0fa-4cc0-81dd-75dc780bb0f0/Cloud-Computing-in-OT-Environments.pdf</span></a><span>&nbsp;&nbsp;</span></span></div><div><div><strong>2025 : explosion des failles dans les systèmes industriels</strong></div><div><span>L’agence américaine de cybersécurité, le CISA, rapporte une augmentation très forte des vulnérabilités ICS : plus de 450 avis publiés, couvrant 200+ fabricants et 700+ produits. Le secteur le plus touché est la manufacture (46%), suivi de l’énergie (21%). Ces deux secteurs ressortent en tête car la majorité des produits vulnérables identifiés par la CISA sont massivement déployés dans les environnements industriels et énergétiques, ce qui augmente mécaniquement leur exposition. Siemens reste le plus concerné (275 avis), puis Rockwell (102 avis) et Schneider (69 avis). Les failles les plus critiques permettent souvent exécution de code à distance ou accès non autorisé, principalement dues à des problèmes de validation d’entrée (CWE-20) et des failles de sécurité mémoire comme les out-of-bounds et buffer overflows. Une hausse des vulnérabilabilités sur des équipements non-traditionnels est aussi observée : caméras, onduleurs, HMI et systèmes de supervision.&nbsp;</span></div><div><span><a href="https://socradar.io/blog/cisa-industrial-control-systems-ics-advisories-2025/" target="_blank" rel="noreferrer noopener"><span>https://socradar.io/blog/cisa-industrial-control-systems-ics-advisories-2025/</span></a><span>&nbsp;</span></span><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><br/></span></p><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnerability&nbsp;Corner :</span>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><div><p style="margin-bottom:13.3333px;"></p><div><table border="1"><tbody><tr><td style="vertical-align:top;width:144px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:144px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:144px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:144px;"><div><p><strong>Liens&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26828" target="_blank" rel="noreferrer noopener">CVE-2021-26828</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>OpenPLC&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>ScadaBR&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="https://github.com/SCADA-LTS/Scada-LTS/pull/2174%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2021-26828" target="_blank" rel="noreferrer noopener">https://github.com/SCADA-LTS/Scada-LTS/pull/2174, https://nvd.nist.gov/vuln/detail/CVE-2021-26828</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48572" target="_blank" rel="noreferrer noopener">CVE-2025-48572</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Android&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Framework&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48572%2C%20https%3A//source.android.com/docs/security/bulletin/2025-12-01" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2025-48572, https://source.android.com/docs/security/bulletin/2025-12-01</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48633" target="_blank" rel="noreferrer noopener">CVE-2025-48633</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Android&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Framework&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48633%2C%20https%3A//source.android.com/docs/security/bulletin/2025-12-01" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2025-48633, https://source.android.com/docs/security/bulletin/2025-12-01</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-55182" target="_blank" rel="noreferrer noopener">CVE-2025-55182</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Meta&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>React Server Components&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-55182%2C%20https%3A//react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2025-55182, https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components</a>&nbsp;</p></div></td></tr></tbody></table></div><br/><p></p></div>
<div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span>&nbsp;</p></div>
<div><div><div><table border="1"><tbody><tr><td style="vertical-align:top;width:82px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Critical&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>High&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Medium&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Low&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Total&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Mirion Medical&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>EC2 Software NMIS BioDose&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>5&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>5&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Johnson Controls Inc.&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>iSTAR eX,OpenBlue Mobile Web Application for OpenBlue Workplace&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>2&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Sunbird&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>DCIM dcTrack&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>2&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>2&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Advantech&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>iView&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Mitsubishi Electric&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>GX Works2&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>SolisCloud&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Monitoring Platform (Cloud API &amp; Device Control API)&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>MAXHUB&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Pivot client application&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Industrial Video &amp; Control&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Longwatch&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Iskra&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>iHUB and iHUB Lite&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr></tbody></table></div><br/></div>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp; </div>
<div><p style="margin-bottom:13.3333px;"></p><div><div><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVSSv3 Score&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVSSv3 Severity&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>EPSS&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>Percentile&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CWE&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Industrial Video &amp; Control&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Longwatch&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13658" target="_blank" rel="noreferrer noopener">CVE-2025-13658</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.078%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>23.396%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/94.html" target="_blank" rel="noreferrer noopener">CWE-94</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Johnson Controls Inc.&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>OpenBlue Mobile Web Application for OpenBlue Workplace&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-26381" target="_blank" rel="noreferrer noopener">CVE-2025-26381</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/425.html" target="_blank" rel="noreferrer noopener">CWE-425</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Iskra&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>iHUB and iHUB Lite&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13510" target="_blank" rel="noreferrer noopener">CVE-2025-13510</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.1&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.087%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>25.444%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener">CWE-306</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Mirion Medical&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>EC2 Software NMIS BioDose&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64298" target="_blank" rel="noreferrer noopener">CVE-2025-64298</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.4&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.013%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>1.455%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/732.html" target="_blank" rel="noreferrer noopener">CWE-732</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Mirion Medical&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>EC2 Software NMIS BioDose&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61940" target="_blank" rel="noreferrer noopener">CVE-2025-61940</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.065%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>20.067%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/603.html" target="_blank" rel="noreferrer noopener">CWE-603</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Mirion Medical&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>EC2 Software NMIS BioDose&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-62575" target="_blank" rel="noreferrer noopener">CVE-2025-62575</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.183%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>40.231%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/732.html" target="_blank" rel="noreferrer noopener">CWE-732</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Mirion Medical&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>EC2 Software NMIS BioDose&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64642" target="_blank" rel="noreferrer noopener">CVE-2025-64642</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.0&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.012%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>1.375%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/732.html" target="_blank" rel="noreferrer noopener">CWE-732</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>SolisCloud&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Monitoring Platform (Cloud API &amp; Device Control API)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13932" target="_blank" rel="noreferrer noopener">CVE-2025-13932</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.7&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/639.html" target="_blank" rel="noreferrer noopener">CWE-639</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Advantech&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>iView&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13373" target="_blank" rel="noreferrer noopener">CVE-2025-13373</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/89.html" target="_blank" rel="noreferrer noopener">CWE-89</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>MAXHUB&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Pivot client application&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-53704" target="_blank" rel="noreferrer noopener">CVE-2025-53704</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/640.html" target="_blank" rel="noreferrer noopener">CWE-640</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Mirion Medical&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>EC2 Software NMIS BioDose&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64778" target="_blank" rel="noreferrer noopener">CVE-2025-64778</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.014%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>2.008%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/798.html" target="_blank" rel="noreferrer noopener">CWE-798</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Sunbird&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>DCIM dcTrack&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66237" target="_blank" rel="noreferrer noopener">CVE-2025-66237</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6.7&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/798.html" target="_blank" rel="noreferrer noopener">CWE-798</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Johnson Controls Inc.&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>iSTAR eX&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61736" target="_blank" rel="noreferrer noopener">CVE-2025-61736</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/298.html" target="_blank" rel="noreferrer noopener">CWE-298</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Sunbird&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>DCIM dcTrack&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66238" target="_blank" rel="noreferrer noopener">CVE-2025-66238</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/288.html" target="_blank" rel="noreferrer noopener">CWE-288</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Mitsubishi Electric&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>GX Works2&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-3784" target="_blank" rel="noreferrer noopener">CVE-2025-3784</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>5.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.008%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.549%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/312.html" target="_blank" rel="noreferrer noopener">CWE-312</a>&nbsp;</p></div></td></tr></tbody></table></div><br/></div><p></p></div></div><div style="clear:both;overflow:visible;direction:ltr;"><div><p style="margin-bottom:13.3333px;">-----&nbsp;</p><p style="margin-bottom:13.3333px;"><strong></strong></p><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Actualité Fortress Cybersecurity </span>&nbsp;<br/></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-juin-2025" target="_blank" rel="noreferrer noopener"></a><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-d-octobre-2025" target="_blank" rel="noreferrer noopener"></a></p></div></div></div></div></div><div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-novembre-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de novembre 2025</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 8 janvier 2026 : Définir sa stratégie de détection en environnement industriel, inscription </span><a href="https://events.teams.microsoft.com/event/591f0891-1fda-4029-9812-497ae82c48ff%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5 février 2026 : Construire le plan de protection de ses installations industrielles, inscription </span><a href="https://events.teams.microsoft.com/event/ff70c30b-3a81-44d5-a118-8541407e5699%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5 mars 2026 : Sécuriser les échanges de fichiers entre les zones industrielles et IT, inscription </span><a href="https://events.teams.microsoft.com/event/7abb2065-6cf1-41bd-956a-9eaaf4655853%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 9 avril 2026 : NIS 2 pour l’industrie​, inscription </span><a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 7 mai 2026 : Segmenter les réseaux industriels​, inscription </span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 4 juin 2026 : Gérer les incidents cyber en environnement industriel​, inscription </span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 2 juillet 2026 : Gérer les vulnérabilités en environnement industriel​​, inscription </span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3 septembre 2026 : Mettre en place le plan de contrôle cyber de ses installations industriels​​, inscription </span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 1 octobre 2026 : Sécuriser les accès à distance et de télémaintenance des actifs industriels, inscription </span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5 novembre 2026 : Protéger les endpoints dans les zones industrielles, inscription </span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3 décembre 2026 : Protéger les réseaux mobiles privés 5G, inscription </span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div></div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div></div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 07 Dec 2025 17:07:55 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 25.S48]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-25.s48</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>L'AIoT et son impact sur l'indusrie &nbsp; Le rapport réalisé par SAS, éditeur de logiciels&nbsp; spécialisés dans les logiciels d’analyse et de gestion ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>L'AIoT et son impact sur l'indusrie</span></span><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>Le rapport réalisé par SAS, éditeur de logiciels&nbsp;<span>spécialisés dans les logiciels d’analyse et de gestions des données</span>, intitulé &quot;How AIoT is reshaping industrial efficiency, security, and decision-making&quot;, explique comment l'AIoT, la combinaison de l'intelligence&nbsp;</span><span>artificielle et de l'Internet des objets, a un impact sur le système&nbsp;</span><span>industriel. Il montre que 71% des entreprises&nbsp;</span><span>utilisent&nbsp;</span><span>l'AIoT pour surveiller&nbsp;</span><span>leurs machines et prévoir les pannes, 54% pour réduire les coûts et 63% pour augmenter la productivité. Le rapport indique&nbsp;</span><span>que&nbsp;</span><span>l'Amérique du Nord est le leader mondial dans l'adoption de l'AIoT dans les systèmes&nbsp;</span><span>industriels</span><span style="font-weight:bold;">, </span><span>tandis&nbsp;</span><span>que&nbsp;</span><span>l'APAC</span><span style="font-weight:bold;"> (</span><span>l'Asie et le Pacifique) et l'EMEA</span><span style="font-weight:bold;"> (</span><span>l'Europe, le Moyen-Orient et l'Afrique</span><span style="font-weight:bold;">) </span><span>investissent dans l'AIoT pour rattraper&nbsp;</span><span>ce&nbsp;</span><span>niveau</span><span style="font-weight:bold;">.</span><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.sas.com/en/whitepapers/how-aiot-is-reshaping-industrial-efficiency-security-and-decision-making.html" target="_blank" rel="noreferrer noopener"><span>https://www.sas.com/en/whitepapers/how-aiot-is-reshaping-industrial-efficiency-security-and-decision-making.html</span></a><span>&nbsp;</span></p></div>
</div><div><div><div><p style="margin-bottom:16px;"><span style="font-weight:bold;"><span>Rapport 2025 : les entreprises toujours vulnérables face aux risques de leur supply chain</span></span><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:16px;"><span>BlueVoyant, éditeur américain de solutions de cybersécurité,&nbsp;a publié son rapport annuel, intitulé &quot;The State of Supply Chain Defense : Annual Global Insights Report 2025&quot;. Ce rapport a pour objectif d'évaluer l'état de la sécurité des chaînes d'approvisionnement face aux risques cyber liés aux tiers. Il révèle que, malgré que 46% des programmes de gestion du risque tiers (TPRM) sont établis, 97% des organisations ont subi au moins une faille liée à leur chaîne d'approvisionnement en 2025, contre 81% en 2024. Ce rapport montre que le problème vient du fait que les entreprises n'intègrent pas ces risques dans leurs décisions importantes et que la collaboration entre les départements est faible.&nbsp;&nbsp;</span></p></div>
<div><p style="margin-bottom:16px;"><a href="https://storage.pardot.com/931493/1762873312JYteS2Q1/The_State_of_Supply_Chain_Defense.pdf" target="_blank" rel="noreferrer noopener"><span>https://storage.pardot.com/931493/1762873312JYteS2Q1/The_State_of_Supply_Chain_Defense.pdf</span></a><span>&nbsp;</span></p></div>
</div><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>DBIR 2025 : Analyse des incidents de sécurité et des compromissions des données</span></span><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>Le rapport Verizon Business, intitulé &quot;2025 Data Breach Investigations Report (DBIR)&quot;, a analysé 22052 incidents de sécurité dans 139&nbsp;pays,&nbsp;dont 121915 compromissions de données. Ces études montrent 1607 violations de données dans le secteur manufacturier contre 849 en 2024. L'exploitation des vulnérabilités a augmenté de 34% et les attaques par ransomware affectent 44% des compromissions. Parmi les attaques ciblant les entreprises, 60% sont des intrusions dans les systèmes, 22% social engineering et 9% sur les applications web.&nbsp;&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.verizon.com/business/resources/reports/dbir/" target="_blank" rel="noreferrer noopener"><span>https://www.verizon.com/business/resources/reports/dbir/</span></a><span>&nbsp;&nbsp;</span></p><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnerability&nbsp;Corner :</span>&nbsp;</p></div>
</div></div><div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p><p style="margin-bottom:13.3333px;"></p><div><table border="1"><tbody><tr><td style="vertical-align:top;width:206px;"><p><strong>CVE&nbsp;</strong></p></td><td style="vertical-align:top;width:173.422px;"><p><strong>Vendor&nbsp;</strong></p></td><td style="vertical-align:top;width:179.188px;"><p><strong>Product&nbsp;</strong></p></td><td style="vertical-align:top;width:717.812px;"><p><strong>Liens&nbsp;</strong></p></td></tr><tr><td style="vertical-align:top;width:206px;"><p><a href="https://www.cve.org/CVERecord?id=CVE-2021-26829" title="CVE-2021-26829" rel="">CVE-2021-26829</a><br/></p></td><td style="vertical-align:top;width:173.422px;"><p>ScadaBR</p></td><td style="vertical-align:top;width:179.188px;"><p>ScadaBR</p></td><td style="vertical-align:top;width:717.812px;" class="zp-selected-cell"><p></p><div><div><a href="https://youtu.be/Xh6LPCiLMa8" title="https://youtu.be/Xh6LPCiLMa8" rel="">https://youtu.be/Xh6LPCiLMa8</a></div><div><a href="http://forum.scadabr.com.br/t/report-falhas-de-seguranca-em-versoes-do-scadabr/3615/4" title="http://forum.scadabr.com.br/t/report-falhas-de-seguranca-em-versoes-do-scadabr/3615/4&nbsp;" rel="">http://forum.scadabr.com.br/t/report-falhas-de-seguranca-em-versoes-do-scadabr/3615/4&nbsp;</a></div></div><p></p></td></tr></tbody></table></div><br/><p></p></div>
<div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span><span style="font-weight:bold;">Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span>&nbsp;</p></div>
<div><div><table border="1"><tbody><tr><td style="vertical-align:top;width:82px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Critical&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>High&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Medium&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Low&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Total&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Zenitel&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>TCIV-3+&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>4&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>5&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Ashlar-Vellum&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Cobalt&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>2&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>2&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Festo Software Compact Vision System SBO-Q-&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>2&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Opto 22&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>groov View Server for Windows&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;" class="zp-selected-cell"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Arena Simulation&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>SiRcom&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>SMART Alert (SiSA)&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr></tbody></table></div>
<div><br/></div>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp; </div>
<div><p style="margin-bottom:13.3333px;"></p><div><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVSSv3 Score&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVSSv3 Severity&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>EPSS&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>Percentile&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CWE</strong>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Software Compact Vision System SBO-Q-&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-31806" target="_blank" rel="noreferrer noopener">CVE-2022-31806</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;" class="zp-selected-cell"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.297%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>52.656%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/1188.html" target="_blank" rel="noreferrer noopener">CWE-1188</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Zenitel&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>TCIV-3+&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64126" target="_blank" rel="noreferrer noopener">CVE-2025-64126</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>3.177%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>86.456%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener">CWE-78</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Zenitel&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>TCIV-3+&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64127" target="_blank" rel="noreferrer noopener">CVE-2025-64127</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>3.177%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>86.456%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener">CWE-78</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Zenitel&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>TCIV-3+&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64128" target="_blank" rel="noreferrer noopener">CVE-2025-64128</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>3.177%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>86.456%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener">CWE-78</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Zenitel&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>TCIV-3+&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64130" target="_blank" rel="noreferrer noopener">CVE-2025-64130</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.108%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>29.616%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer noopener">CWE-79</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>SiRcom&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>SMART Alert (SiSA)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13483" target="_blank" rel="noreferrer noopener">CVE-2025-13483</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.1&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.112%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>30.306%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener">CWE-306</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Software Compact Vision System SBO-Q-&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22515" target="_blank" rel="noreferrer noopener">CVE-2022-22515</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.1&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.084%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>24.764%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/668.html" target="_blank" rel="noreferrer noopener">CWE-668</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Ashlar-Vellum&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Cobalt&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-65084" target="_blank" rel="noreferrer noopener">CVE-2025-65084</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.016%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>2.872%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/787.html" target="_blank" rel="noreferrer noopener">CWE-787</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Ashlar-Vellum&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Cobalt&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-65085" target="_blank" rel="noreferrer noopener">CVE-2025-65085</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.016%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>2.872%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/122.html" target="_blank" rel="noreferrer noopener">CWE-122</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Opto 22&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>groov View Server for Windows&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13084" target="_blank" rel="noreferrer noopener">CVE-2025-13084</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.6&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.036%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>10.023%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/1230.html" target="_blank" rel="noreferrer noopener">CWE-1230</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Zenitel&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>TCIV-3+&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64129" target="_blank" rel="noreferrer noopener">CVE-2025-64129</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.6&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.113%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>30.546%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/787.html" target="_blank" rel="noreferrer noopener">CWE-787</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Arena Simulation&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11918" target="_blank" rel="noreferrer noopener">CVE-2025-11918</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.0&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.004%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.132%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/121.html" target="_blank" rel="noreferrer noopener">CWE-121</a>&nbsp;</p></div></td></tr></tbody></table></div>
<br/><p></p></div></div></div><div><div style="clear:both;overflow:visible;direction:ltr;"><div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;</span></p><p style="margin-bottom:13.3333px;"><strong></strong></p><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Actualité Fortress Cybersecurity </span><span><span>&nbsp;</span><br/></span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-juin-2025" target="_blank" rel="noreferrer noopener"><span></span></a><span><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-d-octobre-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois d'octobre 2025</span></a><span>&nbsp;</span></span><span></span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2025-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div>
</div></div></div></div></div></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;">- 4 <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">décembre</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">2025 :</span> NIS 2 for Industry, inscription </span><span style="line-height:20.7px;"><a href="https://events.teams.microsoft.com/event/a70d0c3e-af20-4a3e-9b41-0a0f0f0a9d5e%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" title="lien" rel="">lien</a></span><span style="line-height:20.7px;">&nbsp;</span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 30 Nov 2025 11:25:13 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 25.S47]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-25.s47</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Campagne UNC1549&nbsp;contre&nbsp;l’aéronautique&nbsp;et la&nbsp;défense UNC1549, groupe présumé iranien, mène depuis 2024 une campagne ciblant l’aéron ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span></span></span></span></span><div><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:16px;"><span style="font-weight:bold;"><span></span></span></p></div><div><div><p style="margin-bottom:16px;"><span style="font-weight:bold;"><span>Campagne UNC1549&nbsp;contre&nbsp;l’aéronautique&nbsp;et la&nbsp;défense</span></span></p><p style="margin-bottom:16px;">UNC1549, groupe présumé iranien, mène depuis 2024 une campagne ciblant l’aéronautique et la défense. Leur objectif est l’espionnage : collecte de données sensibles et pivot vers d’autres entreprises du secteur. Leur opération se distingue par une forte capacité d’évasion : effacement des traces, suppression d’artefacts RDP et utilisation d’infrastructures Azure légitimes pour masquer leurs activités. Ils obtiennent l’accès via phishing très ciblé et via des comptes tiers compromis (Citrix, VMware, AVD). Une fois dans le réseau, ils déploient des backdoors personnalisées et abusent largement du DLL search order hijacking pour rester invisibles. Ils utilisent DCSYNCER.SLICK (DCSync) pour l'élévation de privilèges, CRASHPAD pour vol de mots de passe navigateurs et SIGHTGRAB pour réaliser des captures d'écran, puis se déplacent via RDP, AWRC, SCCM remote control ou tunnels SSH inversés.&nbsp;<br/></p></div><div><p style="margin-bottom:16px;"><a href="https://cloud.google.com/blog/topics/threat-intelligence/analysis-of-unc1549-ttps-targeting-aerospace-defense?hl=en" target="_blank" rel="noreferrer noopener"><span>https://cloud.google.com/blog/topics/threat-intelligence/analysis-of-unc1549-ttps-targeting-aerospace-defense?hl=en</span></a><span>&nbsp;&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Claroty&nbsp;Team82 :&nbsp;IA pour les CPS</span></p></div><div><p style="margin-bottom:13.3333px;"><span><span>L'équipe Team82 de Claroty a publié un rapport intitulé &quot;Resolving the CPS Identity Crisis&quot;, une étude portant sur 17 millions d'actifs industriels et infrastructures critiques (CPS). Ce rapport révèle que 88 % de ces actifs ne transmettent pas de code produit exact et que 76 % utilisent différents noms de ceux des catalogues officiels des fournisseurs, ce qui complique la gestion des vulnérabilités.</span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://web-assets.claroty.com/resource-downloads/cps-library-report.pdf" target="_blank" rel="noreferrer noopener"><span>https://web-assets.claroty.com/resource-downloads/cps-library-report.pdf</span></a><span>&nbsp;&nbsp;<br/></span></p><p style="margin-bottom:13.3333px;"><span></span></p><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">ENISA ROOT&nbsp;CNA :&nbsp;un nouveau&nbsp;rôle&nbsp;pour&nbsp;mieux&nbsp;gérer&nbsp;les&nbsp;vulnérabilités</span></p><p style="margin-bottom:13.3333px;">ENISA, l'agence européenne chargée de la cybersécurité, a un nouveau rôle dans le programme CVE en devenant la racine du programme, &quot;Root CNA (<span>CVE Numbering Authority)</span>&quot;. Les CNA sont des organisations qui sont autorisées par le programme CVE à attribuer des identifiants CVE aux vulnérabilités et à les publier. Ce rôle permettra à ENISA de soutenir et coordonner d'autres CNA, de vérifier que les règles CVE sont respectées et d'améliorer la gestion des vulnérabilités. Grâce à cela, ENISA pourrait mieux faciliter la coordination entre les CSIRT européens et renforcer la cybersécurité en Europe, tel que l'EUVD (European Vulnerability Database) qui est développée par ENISA conformément à la directive NIS2.&nbsp;<br/></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.enisa.europa.eu/news/stepping-up-our-role-in-vulnerability-management-enisa-becomes-cve-root" target="_blank" rel="noreferrer noopener">https://www.enisa.europa.eu/news/stepping-up-our-role-in-vulnerability-management-enisa-becomes-cve-root</a>&nbsp;</p></div></div><p></p></div></div></div></div><div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><div><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnerability&nbsp;Corner :</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div><div><div><table border="1"><tbody><tr><td style="vertical-align:top;width:206px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:173.422px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:179.188px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:717.812px;"><div><p><strong>Liens&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:206px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13223" target="_blank" rel="noreferrer noopener">CVE-2025-13223</a>&nbsp;</p></div></td><td style="vertical-align:top;width:173.422px;"><div><p>Google&nbsp;</p></div></td><td style="vertical-align:top;width:179.188px;"><div><p>Chromium V8&nbsp;</p></div></td><td style="vertical-align:top;width:717.812px;"><div><p><a href="https://chromereleases.googleblog.com/2025/11/stable-channel-update-for-desktop_17.html%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-13223" target="_blank" rel="noreferrer noopener">https://chromereleases.googleblog.com/2025/11/stable-channel-update-for-desktop_17.html, https://nvd.nist.gov/vuln/detail/CVE-2025-13223</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:206px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58034" target="_blank" rel="noreferrer noopener">CVE-2025-58034</a>&nbsp;</p></div></td><td style="vertical-align:top;width:173.422px;"><div><p>Fortinet&nbsp;</p></div></td><td style="vertical-align:top;width:179.188px;"><div><p>FortiWeb&nbsp;</p></div></td><td style="vertical-align:top;width:717.812px;"><div><p><a href="https://fortiguard.fortinet.com/psirt/FG-IR-25-513%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-58034" target="_blank" rel="noreferrer noopener">https://fortiguard.fortinet.com/psirt/FG-IR-25-513, https://nvd.nist.gov/vuln/detail/CVE-2025-58034</a>&nbsp;</p></div></td></tr></tbody></table></div><br/></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span><span style="font-weight:bold;">Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span>&nbsp;</p></div><div><div><table border="1"><tbody><tr style="height:54px;text-align:left;vertical-align:middle;"><td style="vertical-align:top;width:178px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:476.422px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:160.578px;"><div><p><strong>Critical&nbsp;</strong></p></div></td><td style="vertical-align:top;width:124.938px;"><div><p><strong>High&nbsp;</strong></p></div></td><td style="vertical-align:top;width:129.672px;"><div><p><strong>Medium&nbsp;</strong></p></div></td><td style="vertical-align:top;width:101.031px;"><div><p><strong>Low&nbsp;</strong></p></div></td><td style="vertical-align:top;width:119.969px;"><div><p><strong>Total&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:178px;"><div><p>METZ CONNECT&nbsp;</p></div></td><td style="vertical-align:top;width:476.422px;"><div><p>Hardware&nbsp;</p></div></td><td style="vertical-align:top;width:160.578px;"><div><p>2&nbsp;</p></div></td><td style="vertical-align:top;width:124.938px;"><div><p>3&nbsp;</p></div></td><td style="vertical-align:top;width:129.672px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:101.031px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:119.969px;"><div><p>5&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:178px;"><div><p>Automated Logic&nbsp;</p></div></td><td style="vertical-align:top;width:476.422px;"><div><p>Automated Logic&nbsp;WebCTRL&nbsp;Server&nbsp;</p></div></td><td style="vertical-align:top;width:160.578px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:124.938px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:129.672px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:101.031px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:119.969px;"><div><p>2&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:178px;"><div><p>iCam365&nbsp;</p></div></td><td style="vertical-align:top;width:476.422px;"><div><p>ROBOT PT Camera P201&nbsp;</p></div></td><td style="vertical-align:top;width:160.578px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:124.938px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:129.672px;"><div><p>2&nbsp;</p></div></td><td style="vertical-align:top;width:101.031px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:119.969px;"><div><p>2&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:178px;"><div><p>Shelly&nbsp;</p></div></td><td style="vertical-align:top;width:476.422px;"><div><p>Pro 3EM,Pro&nbsp;4PM&nbsp;</p></div></td><td style="vertical-align:top;width:160.578px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:124.938px;"><div><p>2&nbsp;</p></div></td><td style="vertical-align:top;width:129.672px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:101.031px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:119.969px;"><div><p>2&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:178px;"><div><p>Emerson&nbsp;</p></div></td><td style="vertical-align:top;width:476.422px;"><div><p>Appleton UPSMON-PRO&nbsp;</p></div></td><td style="vertical-align:top;width:160.578px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:124.938px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:129.672px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:101.031px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:119.969px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:178px;"><div><p>Opto&nbsp;22&nbsp;</p></div></td><td style="vertical-align:top;width:476.422px;"><div><p>GRV-EPIC-PR1 Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:160.578px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:124.938px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:129.672px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:101.031px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:119.969px;"><div><p>1&nbsp;</p></div></td></tr></tbody></table></div><br/></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</p><p style="margin-bottom:13.3333px;"></p><div><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVSSv3 Score&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVSSv3 Severity&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>EPSS&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>Percentile&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CWE&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Emerson&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Appleton UPSMON-PRO&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3871" target="_blank" rel="noreferrer noopener">CVE-2024-3871</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>1.937%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>81.940%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/121.html" target="_blank" rel="noreferrer noopener">CWE-121</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>METZ CONNECT&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Hardware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-41733" target="_blank" rel="noreferrer noopener">CVE-2025-41733</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.084%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>20.576%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/305.html" target="_blank" rel="noreferrer noopener">CWE-305</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>METZ CONNECT&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Hardware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-41734" target="_blank" rel="noreferrer noopener">CVE-2025-41734</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.088%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>21.269%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/98.html" target="_blank" rel="noreferrer noopener">CWE-98</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Automated Logic&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Automated Logic&nbsp;WebCTRL&nbsp;Server&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-8527" target="_blank" rel="noreferrer noopener">CVE-2024-8527</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.014%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>1.062%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/601.html" target="_blank" rel="noreferrer noopener">CWE-601</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>METZ CONNECT&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Hardware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-41735" target="_blank" rel="noreferrer noopener">CVE-2025-41735</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.208%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>38.906%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/434.html" target="_blank" rel="noreferrer noopener">CWE-434</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>METZ CONNECT&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Hardware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-41736" target="_blank" rel="noreferrer noopener">CVE-2025-41736</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.287%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>49.180%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/35.html" target="_blank" rel="noreferrer noopener">CWE-35</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Automated Logic&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Automated Logic&nbsp;WebCTRL&nbsp;Server&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-8528" target="_blank" rel="noreferrer noopener">CVE-2024-8528</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.022%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>2.945%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer noopener">CWE-79</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>METZ CONNECT&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Hardware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-41737" target="_blank" rel="noreferrer noopener">CVE-2025-41737</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.033%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>5.363%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/284.html" target="_blank" rel="noreferrer noopener">CWE-284</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Shelly&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Pro 4PM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11243" target="_blank" rel="noreferrer noopener">CVE-2025-11243</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.4&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.016%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>1.853%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/770.html" target="_blank" rel="noreferrer noopener">CWE-770</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Shelly&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Pro 3EM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-12056" target="_blank" rel="noreferrer noopener">CVE-2025-12056</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.4&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.016%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>1.811%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener">CWE-125</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>iCam365&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>ROBOT PT Camera P201&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-62674" target="_blank" rel="noreferrer noopener">CVE-2025-62674</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener">CWE-306</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>iCam365&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>ROBOT PT Camera P201&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64770" target="_blank" rel="noreferrer noopener">CVE-2025-64770</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener">CWE-306</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Opto&nbsp;22&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>GRV-EPIC-PR1 Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13087" target="_blank" rel="noreferrer noopener">CVE-2025-13087</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6.2&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener">CWE-78</a>&nbsp;</p></div></td></tr></tbody></table></div><p></p></div></div></div></div></div><div><div style="clear:both;overflow:visible;direction:ltr;"><div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;</span></p><p style="margin-bottom:13.3333px;"><strong></strong></p><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Actualité Fortress Cybersecurity </span><span><span>&nbsp;</span><br/></span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-juin-2025" target="_blank" rel="noreferrer noopener"><span></span></a><span><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-d-octobre-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois d'octobre 2025</span></a><span>&nbsp;</span></span><span></span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2025-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div></div></div></div></div></div></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;">- 4 <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">décembre</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">2025 :</span> NIS 2 for Industry, inscription </span><span style="line-height:20.7px;"><a href="https://events.teams.microsoft.com/event/a70d0c3e-af20-4a3e-9b41-0a0f0f0a9d5e%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" title="lien" rel="">lien</a></span><span style="line-height:20.7px;">&nbsp;</span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 24 Nov 2025 00:59:15 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 25.S46]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-25.s46</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Sharp7Extend :&nbsp;un&nbsp;paquet&nbsp;NuGet&nbsp;ciblant&nbsp;les automates Siemens S7 &nbsp; Des&nbsp;chercheurs&nbsp;de socket&nbsp;ont&nbsp;identif ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span></span></span></span></span><div><div><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:16px;"><span style="font-weight:bold;"><span>Sharp7Extend :&nbsp;un&nbsp;paquet&nbsp;NuGet&nbsp;ciblant&nbsp;les automates Siemens S7</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:16px;"><span>Des&nbsp;chercheurs&nbsp;de socket&nbsp;ont&nbsp;identifié&nbsp;neuf&nbsp;paquets&nbsp;malveillants&nbsp;publiés&nbsp;via NuGet entre 2023 et 2024. Le&nbsp;paquet&nbsp;le plus&nbsp;dangereux&nbsp;est Sharp7Extend, qui&nbsp;cible&nbsp;les automates&nbsp;programmables&nbsp;Siemens S7 (PLC). Environ 30 à 90 minutes après&nbsp;que&nbsp;l'application&nbsp;a&nbsp;commencé&nbsp;à&nbsp;exécuter&nbsp;le&nbsp;paquet, il active un code&nbsp;caché&nbsp;qui&nbsp;perturbe&nbsp;la communication avec le PLC,&nbsp;ce&nbsp;qui&nbsp;peut&nbsp;provoquer&nbsp;des&nbsp;erreurs&nbsp;dans les&nbsp;systèmes&nbsp;qui&nbsp;utilisent&nbsp;les données de&nbsp;l'automate.&nbsp;&nbsp;</span></p></div><div><p style="margin-bottom:16px;"><a href="https://socket.dev/blog/9-malicious-nuget-packages-deliver-time-delayed-destructive-payloads" target="_blank" rel="noreferrer noopener"><span>https://socket.dev/blog/9-malicious-nuget-packages-deliver-time-delayed-destructive-payloads</span></a><span>&nbsp;&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Comparitech&nbsp;:&nbsp;Ransomware&nbsp;en&nbsp;octobre&nbsp;2025</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:16px;"><span>D'après les statistiques révélées par&nbsp;Comparitech&nbsp;concernant les ransomwares en octobre 2025, 684 attaques ont été recensées dans différents secteurs, dont seulement 47 confirmées, et 588 de ces attaques concernaient le secteur du business. Le secteur manufacturier représente environ 19&nbsp;%&nbsp;des&nbsp;attaques. Le groupe Qilin est le plus actif, avec plus de 700 attaques en 2025, dont 186 victimes&nbsp;uniquement&nbsp;en octobre 2025. Les pays les plus ciblés en octobre 2025 sont les États-Unis avec 374 attaques dont 10 confirmées, le Canada 42 attaques dont 1 confirmée et la France 29 attaques dont&nbsp;cinq&nbsp;confirmées.&nbsp;</span></p></div><div><p style="margin-bottom:16px;"><a href="https://www.comparitech.com/news/ransomware-roundup-october-2025/" target="_blank" rel="noreferrer noopener"><span>https://www.comparitech.com/news/ransomware-roundup-october-2025/</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>OWASP&nbsp;2025 :&nbsp;défaillances&nbsp;de la&nbsp;chaîne&nbsp;d'approvisionnement&nbsp;logicielle</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:16px;"><span>Une mise&nbsp;à jour de l'OWASP Top 10 pour l'an 2025, concerne les défaillances de la chaîne d'approvisionnement logicielle, &quot;&nbsp;A03 :&nbsp;2025 Software&nbsp;supply&nbsp;chain&nbsp;failures&quot;, qui remplace l'ancienne catégorie de l'an 2021 pour les composants vulnérables et obsolètes &quot;&nbsp;A06 :&nbsp;2021&nbsp;Vulnerable&nbsp;and&nbsp;Outdated&nbsp;Components&quot;. Cette nouvelle catégorie couvre toutes les failles liées aux dépendances logicielles (bibliothèques, modules), aux systèmes de compilation et aux mécanismes de distribution.&nbsp;</span></p></div><div><p style="margin-bottom:16px;"><a href="https://owasp.org/Top10/2025/0x00_2025-Introduction/" target="_blank" rel="noreferrer noopener"><span>https://owasp.org/Top10/2025/0x00_2025-Introduction/</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Rapport&nbsp;Zscaler&nbsp;2025 :&nbsp;les&nbsp;systèmes&nbsp;industriels&nbsp;sont&nbsp;les plus&nbsp;ciblés</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:16px;"><span>Zscaler&nbsp;a publié un rapport intitulé &quot;ThreatLabz&nbsp;2025 Ransomware Report&quot;. Ce rapport révèle qu'entre avril 2024 et avril&nbsp;2025,&nbsp;les attaques par ransomware ont augmenté. Les systèmes industriels sont le plus ciblés, avec 1063 attaques dans le secteur manufacturier et 922 dans le secteur de technologie. Les pays les plus touchés sont les États-Unis,&nbsp;1821 attaques par ransomware en 2024 et 3671 en 2025, le Canada 128 attaques en 2024 et 377 en 2025. Et l'Europe, notamment la France, qui passe de 119 attaques en 2024 à 159 en 2025. Le&nbsp;groupe le plus actif est&nbsp;RansomHub&nbsp;avec 833 attaques recensées. Des vulnérabilités ont été identifiées dans plusieurs outils, tel&nbsp;que :&nbsp;les outils d'accès à distance CVE-2024-57726, CVE-2024-57727 et CVE-2024-57728 (SimpleHelp&nbsp;RMM).&nbsp;</span></p></div><div><p style="margin-bottom:16px;"><a href="https://threatlabz.zscaler.com/" target="_blank" rel="noreferrer noopener"><span>https://threatlabz.zscaler.com/</span></a><span>&nbsp;</span></p></div></div><p></p></div></div><div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;line-height:1;"></p><div><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnerability&nbsp;Corner :</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div><div><div><table border="1"><tbody><tr><td style="vertical-align:top;width:144px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:144px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:144px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:144px;"><div><p><strong>Liens&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-12480" target="_blank" rel="noreferrer noopener">CVE-2025-12480</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Gladinet&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Triofox&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="https://access.triofox.com/releases_history%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-12480" target="_blank" rel="noreferrer noopener">https://access.triofox.com/releases_history, https://nvd.nist.gov/vuln/detail/CVE-2025-12480</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21042" target="_blank" rel="noreferrer noopener">CVE-2025-21042</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Samsung&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Mobile Devices&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21042%2C%20https%3A//security.samsungmobile.com/securityUpdate.smsb?year=2025&amp;month=04" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2025-21042, https://security.samsungmobile.com/securityUpdate.smsb?year=2025&amp;month=04</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-62215" target="_blank" rel="noreferrer noopener">CVE-2025-62215</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Microsoft&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Windows&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-62215%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-62215" target="_blank" rel="noreferrer noopener">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-62215, https://nvd.nist.gov/vuln/detail/CVE-2025-62215</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9242" target="_blank" rel="noreferrer noopener">CVE-2025-9242</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>WatchGuard&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Firebox&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9242%2C%20https%3A//www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00015" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2025-9242, https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00015</a>&nbsp;</p></div></td></tr></tbody></table></div><br/></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span><span style="font-weight:bold;">Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span>&nbsp;</p></div><div><div><table border="1"><tbody><tr><td style="vertical-align:top;width:82px;" class="zp-selected-cell"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Critical&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>High&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Medium&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Low&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Tota</strong>l&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Siemens&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Altair Grid&nbsp;Engine,COMOS,LOGO! 12/24RCE (6ED1052-1MD08-0BA2),SICAM&nbsp;P850 (7KG8500-0AA00-0AA0),Siemens&nbsp;Software&nbsp;Center,Solid&nbsp;Edge SE2025,Spectrum&nbsp;Power 4&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>10&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>5&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>16&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>AADvance-Trusted SIS&nbsp;Workstation,FactoryTalk&nbsp;DataMosaix&nbsp;Private&nbsp;Cloud,FactoryTalk&nbsp;Policy&nbsp;Manager,Studio&nbsp;5000 Simulation&nbsp;Interface,Verve&nbsp;Asset Manager&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>5&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>7&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>General Industrial Controls&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Lynx+ Gateway&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>3&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>4&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Brightpick&nbsp;AI&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Brightpick&nbsp;Mission Control / Internal Logic Control&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>2&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>3&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>AVEVA&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Application&nbsp;Server,Edge&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>2&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Mitsubishi Electric&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>FX5U-32MT/ES&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr></tbody></table></div><br/></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</p><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;" class="zp-selected-cell"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVSSv3 Score&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVSSv3 Severity&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>EPSS&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>Percentile&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CWE&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>General Industrial Controls&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Lynx+ Gateway&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58083" target="_blank" rel="noreferrer noopener">CVE-2025-58083</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>10.0&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener">CWE-306</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Verve Asset Manager&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11862" target="_blank" rel="noreferrer noopener">CVE-2025-11862</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.9&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.038%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>11.182%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/863.html" target="_blank" rel="noreferrer noopener">CWE-863</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Siemens&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>COMOS&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45133" target="_blank" rel="noreferrer noopener">CVE-2023-45133</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.080%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>24.193%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/184.html" target="_blank" rel="noreferrer noopener">CWE-184</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>AADvance-Trusted SIS Workstation&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48510" target="_blank" rel="noreferrer noopener">CVE-2024-48510</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.713%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>71.569%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/22.html" target="_blank" rel="noreferrer noopener">CWE-22</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Studio 5000 Simulation Interface&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11696" target="_blank" rel="noreferrer noopener">CVE-2025-11696</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.014%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>1.947%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/22.html" target="_blank" rel="noreferrer noopener">CWE-22</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Studio 5000 Simulation Interface&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11697" target="_blank" rel="noreferrer noopener">CVE-2025-11697</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.016%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>2.812%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/918.html" target="_blank" rel="noreferrer noopener">CWE-918</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Siemens&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Spectrum Power 4&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32011" target="_blank" rel="noreferrer noopener">CVE-2024-32011</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.064%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>20.000%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/829.html" target="_blank" rel="noreferrer noopener">CWE-829</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Siemens&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>COMOS&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0056" target="_blank" rel="noreferrer noopener">CVE-2024-0056</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.7&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.346%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>56.520%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/319.html" target="_blank" rel="noreferrer noopener">CWE-319</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Brightpick&nbsp;AI&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Brightpick&nbsp;Mission Control / Internal Logic Control&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64309" target="_blank" rel="noreferrer noopener">CVE-2025-64309</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.6&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/523.html" target="_blank" rel="noreferrer noopener">CWE-523</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>AVEVA&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Edge&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9317" target="_blank" rel="noreferrer noopener">CVE-2025-9317</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.4&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/327.html" target="_blank" rel="noreferrer noopener">CWE-327</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>General Industrial Controls&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Lynx+ Gateway&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-55034" target="_blank" rel="noreferrer noopener">CVE-2025-55034</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.2&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/521.html" target="_blank" rel="noreferrer noopener">CWE-521</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>FactoryTalk&nbsp;DataMosaix&nbsp;Private Cloud&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11085" target="_blank" rel="noreferrer noopener">CVE-2025-11085</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.0&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.063%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>19.710%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/116.html" target="_blank" rel="noreferrer noopener">CWE-116</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Siemens&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Spectrum Power 4&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32008" target="_blank" rel="noreferrer noopener">CVE-2024-32008</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.011%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>1.056%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/648.html" target="_blank" rel="noreferrer noopener">CWE-648</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Siemens&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Spectrum Power 4&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32009" target="_blank" rel="noreferrer noopener">CVE-2024-32009</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.010%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.751%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/266.html" target="_blank" rel="noreferrer noopener">CWE-266</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Siemens&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Spectrum Power 4&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32010" target="_blank" rel="noreferrer noopener">CVE-2024-32010</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.012%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>1.213%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/732.html" target="_blank" rel="noreferrer noopener">CWE-732</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Siemens&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Altair Grid Engine&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40763" target="_blank" rel="noreferrer noopener">CVE-2025-40763</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.014%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>1.675%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/427.html" target="_blank" rel="noreferrer noopener">CWE-427</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Siemens&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Siemens Software Center&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40827" target="_blank" rel="noreferrer noopener">CVE-2025-40827</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.015%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>2.197%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/427.html" target="_blank" rel="noreferrer noopener">CWE-427</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Siemens&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>LOGO! 12/24RCE (6ED1052-1MD08-0BA2)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40816" target="_blank" rel="noreferrer noopener">CVE-2025-40816</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.6&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.033%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.723%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener">CWE-306</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Brightpick&nbsp;AI&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Brightpick&nbsp;Mission Control / Internal Logic Control&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64308" target="_blank" rel="noreferrer noopener">CVE-2025-64308</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/523.html" target="_blank" rel="noreferrer noopener">CWE-523</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>General Industrial Controls&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Lynx+ Gateway&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59780" target="_blank" rel="noreferrer noopener">CVE-2025-59780</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener">CWE-306</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>General Industrial Controls&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Lynx+ Gateway&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-62765" target="_blank" rel="noreferrer noopener">CVE-2025-62765</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/319.html" target="_blank" rel="noreferrer noopener">CWE-319</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>FactoryTalk Policy Manager&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-22019" target="_blank" rel="noreferrer noopener">CVE-2024-22019</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.149%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>36.065%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/404.html" target="_blank" rel="noreferrer noopener">CWE-404</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Siemens&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Solid Edge SE2025&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40744" target="_blank" rel="noreferrer noopener">CVE-2025-40744</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.016%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>2.726%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/295.html" target="_blank" rel="noreferrer noopener">CWE-295</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Siemens&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>LOGO! 12/24RCE (6ED1052-1MD08-0BA2)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40815" target="_blank" rel="noreferrer noopener">CVE-2025-40815</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.2&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.039%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>11.476%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/120.html" target="_blank" rel="noreferrer noopener">CWE-120</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>AVEVA&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Application Server&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-8386" target="_blank" rel="noreferrer noopener">CVE-2025-8386</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6.9&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/80.html" target="_blank" rel="noreferrer noopener">CWE-80</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>FactoryTalk&nbsp;DataMosaix&nbsp;Private Cloud&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11084" target="_blank" rel="noreferrer noopener">CVE-2025-11084</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.016%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>2.612%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/1390.html" target="_blank" rel="noreferrer noopener">CWE-1390</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Brightpick&nbsp;AI&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Brightpick&nbsp;Mission Control / Internal Logic Control&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64307" target="_blank" rel="noreferrer noopener">CVE-2025-64307</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener">CWE-306</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Siemens&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>LOGO! 12/24RCE (6ED1052-1MD08-0BA2)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40817" target="_blank" rel="noreferrer noopener">CVE-2025-40817</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.020%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>4.177%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener">CWE-306</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Siemens&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>SICAM P850 (7KG8500-0AA00-0AA0)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31238" target="_blank" rel="noreferrer noopener">CVE-2023-31238</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>5.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.099%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>28.296%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/732.html" target="_blank" rel="noreferrer noopener">CWE-732</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Siemens&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Altair Grid Engine&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40760" target="_blank" rel="noreferrer noopener">CVE-2025-40760</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>5.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.016%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>2.419%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/209.html" target="_blank" rel="noreferrer noopener">CWE-209</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Mitsubishi Electric&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>FX5U-32MT/ES&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-10259" target="_blank" rel="noreferrer noopener">CVE-2025-10259</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>5.3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.025%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>5.652%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/1284.html" target="_blank" rel="noreferrer noopener">CWE-1284</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Siemens&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Spectrum Power 4&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32014" target="_blank" rel="noreferrer noopener">CVE-2024-32014</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>4.7&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.013%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>1.452%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/732.html" target="_blank" rel="noreferrer noopener">CWE-732</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Siemens&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>SICAM P850 (7KG8500-0AA00-0AA0)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-30901" target="_blank" rel="noreferrer noopener">CVE-2023-30901</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>4.3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.137%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>34.351%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/352.html" target="_blank" rel="noreferrer noopener">CWE-352</a>&nbsp;</p></div></td></tr></tbody></table></div></div></div></div></div><div><div style="clear:both;overflow:visible;direction:ltr;"><div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;</span></p><p style="margin-bottom:13.3333px;"><strong></strong></p><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Actualité Fortress Cybersecurity </span><span><span>&nbsp;</span><br/></span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-juin-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de juin 2025</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2025-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div></div></div></div></div></div></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;">- 4 <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">décembre</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">2025 :</span> NIS 2 for Industry, inscription </span><span style="line-height:20.7px;"><a href="https://events.teams.microsoft.com/event/a70d0c3e-af20-4a3e-9b41-0a0f0f0a9d5e%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" title="lien" rel="">lien</a></span><span style="line-height:20.7px;">&nbsp;</span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 16 Nov 2025 20:49:59 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 25.S43]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-25.s43</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Guide international : sécuriser les systèmes industriels &nbsp; Le CISA et le FBI (Federal Bureau of Investigation) ont collaboré avec le NCSC (National ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span></span></span></span></span><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Guide international : sécuriser les systèmes industriels</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Le CISA et le FBI (Federal Bureau of Investigation) ont collaboré avec le NCSC (National Cyber Security Centre), l'agence nationale de cybersécurité britannique et cinq partenaires internationaux, afin de créer le guide intitulé &quot;Creating and maintaining a definitive view of your OT architecture&quot;. Ce guide propose cinq principes : créer et maintenir une vue complète sur tous les équipements du système industriel, mettre en place un programme de sécurité&nbsp;pour&nbsp;protéger les informations sensibles, classer les équipements selon leur criticité, documenter la connexion entre les équipements pour éviter les failles et de contrôler les risques provenant des fournisseurs</span><span style="font-weight:bold;">.</span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.cisa.gov/resources-tools/resources/creating-and-maintaining-definitive-view-your-operational-technology-ot-architecture" target="_blank" rel="noreferrer noopener"><span style="font-weight:bold;"><span>https://www.cisa.gov/resources-tools/resources/creating-and-maintaining-definitive-view-your-operational-technology-ot-architecture</span></span></a><span style="font-weight:bold;">&nbsp;</span><span>&nbsp;</span></p></div></div><div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><div><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Cybersécurité de l'OT dans le secteur aéroportuaire</span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>AtkinsRéalis (groupe d'ingénierie) met en lumière la pression réglementaire croissante (notamment NIS2, TSA) exercée sur les aéroports pour renforcer leur cybersécurité. L'article souligne que les systèmes de Technologie Opérationnelle (TA), souvent anciens et non considérés comme &quot;critiques&quot;, constituent une vulnérabilité&nbsp;majeure,&nbsp;aggravée par l'inadéquation des pratiques de sécurité IT face aux exigences de haute disponibilité de l'OT. Pour y remédier, AtkinsRéalis préconise l'adoption d'une approche&nbsp; (&quot;systems of systems&quot;) qui consiste à prendre en compte l'ensemble des interactions, des dépendances et des objectifs communs entre ces systèmes.&nbsp;</span></p></div></div><a href="https://www.cisa.gov/resources-tools/resources/creating-and-maintaining-definitive-view-your-operational-technology-ot-architecture"><span></span></a><a href="https://airport-world.com/navigating-cyber-threats/" target="_blank" rel="noreferrer noopener"><span>https://airport-world.com/navigating-cyber-threats/</span></a><span> &nbsp;</span><br/></div><div><p style="margin-bottom:13.3333px;line-height:1;"><span style="font-weight:bold;"><br/></span></p><p style="margin-bottom:13.3333px;line-height:1;"><span style="font-weight:bold;">Vulnerability Corner :</span>&nbsp;</p></div></div></div><div><div style="clear:both;overflow:visible;direction:ltr;"><div><div><p style="margin-bottom:13.3333px;"><span>Liste des Known Exploited Vulnerabilities (KEV) publiés par l'agence de cybersécurité américaine CISA la semaine dernière :&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><div><div><table border="1"><tbody><tr><td style="vertical-align:top;width:144px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:144px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:144px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:144px;"><div><div><p><span>Liens&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48503" target="_blank" rel="noreferrer noopener"><span>CVE-2022-48503</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:144px;"><div><div><p><span>Apple&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:144px;"><div><div><p><span>Multiple Products&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:144px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48503%2C%20https%3A//support.apple.com/en-us/HT213340%2C%20https%3A//support.apple.com/en-us/HT213341%2C%20https%3A//support.apple.com/en-us/HT213342%2C%20https%3A//support.apple.com/en-us/HT213345%2C%20https%3A//support.apple.com/en-us/HT213346" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2022-48503, https://support.apple.com/en-us/HT213340, https://support.apple.com/en-us/HT213341, https://support.apple.com/en-us/HT213342, https://support.apple.com/en-us/HT213345, https://support.apple.com/en-us/HT213346</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-2746" target="_blank" rel="noreferrer noopener"><span>CVE-2025-2746</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:144px;"><div><div><p><span>Kentico&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:144px;"><div><div><p><span>Xperience CMS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:144px;"><div><div><p><a href="https://devnet.kentico.com/download/hotfixes%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-2746" target="_blank" rel="noreferrer noopener"><span>https://devnet.kentico.com/download/hotfixes, https://nvd.nist.gov/vuln/detail/CVE-2025-2746</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-2747" target="_blank" rel="noreferrer noopener"><span>CVE-2025-2747</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:144px;"><div><div><p><span>Kentico&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:144px;"><div><div><p><span>Xperience CMS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:144px;"><div><div><p><a href="https://devnet.kentico.com/download/hotfixes%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-2747" target="_blank" rel="noreferrer noopener"><span>https://devnet.kentico.com/download/hotfixes, https://nvd.nist.gov/vuln/detail/CVE-2025-2747</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-33073" target="_blank" rel="noreferrer noopener"><span>CVE-2025-33073</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:144px;"><div><div><p><span>Microsoft&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:144px;"><div><div><p><span>Windows&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:144px;"><div><div><p><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-33073%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-33073" target="_blank" rel="noreferrer noopener"><span>https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-33073, https://nvd.nist.gov/vuln/detail/CVE-2025-33073</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61884" target="_blank" rel="noreferrer noopener"><span>CVE-2025-61884</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:144px;"><div><div><p><span>Oracle&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:144px;"><div><div><p><span>E-Business Suite&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:144px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61884%2C%20https%3A//www.oracle.com/security-alerts/alert-cve-2025-61884.html" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2025-61884, https://www.oracle.com/security-alerts/alert-cve-2025-61884.html</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61932" target="_blank" rel="noreferrer noopener"><span>CVE-2025-61932</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:144px;"><div><div><p><span>Motex&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:144px;"><div><div><p><span>LANSCOPE Endpoint Manager&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:144px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61932%2C%20https%3A//www.motex.co.jp/news/notice/2025/release251020/" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2025-61932, https://www.motex.co.jp/news/notice/2025/release251020/</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div><br/></div></div></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités de composants de systèmes industriels :&nbsp;</span></span><span>&nbsp;</span></p></div><div><div><table border="1"><tbody><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Critical&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>High&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Medium&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Low&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Total&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>AutomationDirect&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Productivity Suite&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>9&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Rockwell Automation&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1783-NATR,Compact GuardLogix 5370&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>4&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Oxford Nanopore Technologies&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>MinKNOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>3&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Delta Electronics&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>ASDA-Soft&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>2&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Veeder-Root&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>TLS4B&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>2&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>NIHON KOHDEN&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Central Monitor CNS-6201&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>CloudEdge&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>CloudEdge App&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>ASKI Energy&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>ALS-mini-s4 IP (serial number from 2000 to 5166)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Raisecomm&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>RAX701-GC-WP-01 P200R002C52&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr></tbody></table></div><br/></div><div>Liste complète triée par CVSSv3 Score :&nbsp;</div><div><div style="margin-bottom:2px;"><div><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Score&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Severity&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EPSS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Percentile&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CWE&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>ASKI Energy&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ALS-mini-s4 IP (serial number from 2000 to 5166)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9574" target="_blank" rel="noreferrer noopener"><span>CVE-2025-9574</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>10.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.050%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>15.472%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>AutomationDirect&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Productivity Suite&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61934" target="_blank" rel="noreferrer noopener"><span>CVE-2025-61934</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>10.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/1327.html" target="_blank" rel="noreferrer noopener"><span>CWE-1327</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Rockwell Automation&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1783-NATR&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-7328" target="_blank" rel="noreferrer noopener"><span>CVE-2025-7328</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>10.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.059%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>18.681%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Veeder-Root&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>TLS4B&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58428" target="_blank" rel="noreferrer noopener"><span>CVE-2025-58428</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.9&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/77.html" target="_blank" rel="noreferrer noopener"><span>CWE-77</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Raisecomm&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>RAX701-GC-WP-01 P200R002C52&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11534" target="_blank" rel="noreferrer noopener"><span>CVE-2025-11534</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.084%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>25.326%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/288.html" target="_blank" rel="noreferrer noopener"><span>CWE-288</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>AutomationDirect&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Productivity Suite&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-62498" target="_blank" rel="noreferrer noopener"><span>CVE-2025-62498</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/23.html" target="_blank" rel="noreferrer noopener"><span>CWE-23</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Oxford Nanopore Technologies&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MinKNOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35585" target="_blank" rel="noreferrer noopener"><span>CVE-2024-35585</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Rockwell Automation&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1783-NATR&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-7329" target="_blank" rel="noreferrer noopener"><span>CVE-2025-7329</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.057%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>17.814%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer noopener"><span>CWE-79</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Rockwell Automation&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1783-NATR&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-7330" target="_blank" rel="noreferrer noopener"><span>CVE-2025-7330</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.025%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.477%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/352.html" target="_blank" rel="noreferrer noopener"><span>CWE-352</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Delta Electronics&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ASDA-Soft&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-62579" target="_blank" rel="noreferrer noopener"><span>CVE-2025-62579</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.014%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.797%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/121.html" target="_blank" rel="noreferrer noopener"><span>CWE-121</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Delta Electronics&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ASDA-Soft&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-62580" target="_blank" rel="noreferrer noopener"><span>CVE-2025-62580</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.014%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.797%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/121.html" target="_blank" rel="noreferrer noopener"><span>CWE-121</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Oxford Nanopore Technologies&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MinKNOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-54808" target="_blank" rel="noreferrer noopener"><span>CVE-2025-54808</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>AutomationDirect&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Productivity Suite&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58078" target="_blank" rel="noreferrer noopener"><span>CVE-2025-58078</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/23.html" target="_blank" rel="noreferrer noopener"><span>CWE-23</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>AutomationDirect&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Productivity Suite&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58429" target="_blank" rel="noreferrer noopener"><span>CVE-2025-58429</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/23.html" target="_blank" rel="noreferrer noopener"><span>CWE-23</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>CloudEdge&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CloudEdge App&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11757" target="_blank" rel="noreferrer noopener"><span>CVE-2025-11757</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.042%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>12.492%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/155.html" target="_blank" rel="noreferrer noopener"><span>CWE-155</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>NIHON KOHDEN&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Central Monitor CNS-6201&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59668" target="_blank" rel="noreferrer noopener"><span>CVE-2025-59668</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.057%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>17.920%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/476.html" target="_blank" rel="noreferrer noopener"><span>CWE-476</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Rockwell Automation&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Compact GuardLogix 5370&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9124" target="_blank" rel="noreferrer noopener"><span>CVE-2025-9124</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.055%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>17.445%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/248.html" target="_blank" rel="noreferrer noopener"><span>CWE-248</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>AutomationDirect&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Productivity Suite&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-62688" target="_blank" rel="noreferrer noopener"><span>CVE-2025-62688</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/732.html" target="_blank" rel="noreferrer noopener"><span>CWE-732</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Veeder-Root&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>TLS4B&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-55067" target="_blank" rel="noreferrer noopener"><span>CVE-2025-55067</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/190.html" target="_blank" rel="noreferrer noopener"><span>CWE-190</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>AutomationDirect&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Productivity Suite&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61977" target="_blank" rel="noreferrer noopener"><span>CVE-2025-61977</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/640.html" target="_blank" rel="noreferrer noopener"><span>CWE-640</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>AutomationDirect&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Productivity Suite&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58456" target="_blank" rel="noreferrer noopener"><span>CVE-2025-58456</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/23.html" target="_blank" rel="noreferrer noopener"><span>CWE-23</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Oxford Nanopore Technologies&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MinKNOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-10937" target="_blank" rel="noreferrer noopener"><span>CVE-2025-10937</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/754.html" target="_blank" rel="noreferrer noopener"><span>CWE-754</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>AutomationDirect&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Productivity Suite&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59776" target="_blank" rel="noreferrer noopener"><span>CVE-2025-59776</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/23.html" target="_blank" rel="noreferrer noopener"><span>CWE-23</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>AutomationDirect&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Productivity Suite&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-60023" target="_blank" rel="noreferrer noopener"><span>CVE-2025-60023</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/23.html" target="_blank" rel="noreferrer noopener"><span>CWE-23</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div><br/></div></div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;</span></p><p style="margin-bottom:13.3333px;"><strong></strong></p><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Actualité Fortress Cybersecurity </span><span><span>&nbsp;</span><br/></span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-juin-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de juin 2025</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2025-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div></div><p></p></div></div><p></p></div></div></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;">- 6 <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">novembre</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">2025 :&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Cybersécurité</span> de la 5G <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">privée&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">en&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">environnement&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">industriel</span>, inscription </span><span style="line-height:20.7px;"><a href="https://events.teams.microsoft.com/event/9078c5c1-6c11-46de-b26f-10c9a073931d%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" title="lien" rel="">lien</a></span><span style="line-height:20.7px;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;">- 4 <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">décembre</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">2025 :</span> NIS 2 for Industry, inscription </span><span style="line-height:20.7px;"><a href="https://events.teams.microsoft.com/event/a70d0c3e-af20-4a3e-9b41-0a0f0f0a9d5e%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" title="lien" rel="">lien</a></span><span style="line-height:20.7px;">&nbsp;</span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 26 Oct 2025 21:53:57 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 25.S42]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-25.s42</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>NCSC 2025 : cyberattaques en augmentation &nbsp; Le NCSC (National Cyber Security Centre) est l'agence nationale de cybersécurité &nbsp; britannique . Elle ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span>NCSC </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">2025 :</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">cyberattaques </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">en</span><span> augmentation</span></span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp; </span></span><br/><span></span></span><div><br/><div><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"><span>Le NCSC (National Cyber Security Centre) est l'agence nationale de cybersécurité</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">britannique</span><span>. Elle&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">fournit</span><span> des conseils, des </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">outils</span><span> et des </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">règles</span><span> de </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">sécurité</span><span> aux </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">entreprises</span><span> et aux </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">citoyens du Royaume</span><span>. </span><span>Le NCSC a </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">publié</span><span> son rapport </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">annuel</span><span> 2025, </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">intitulé</span><span> &quot;It's time to act&quot;. Ce rapport </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">signale</span><span> 1727 incidents </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">cette&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">année</span><span>, </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">dont</span><span> 429 </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">ont&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">été&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">traités</span><span>. Il montre </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">que</span><span> les menaces </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">viennent</span><span>&nbsp;principalement de</span><span>&nbsp;la Chine, la Russie et </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">l'Iran</span><span>.&nbsp;</span></span></span>L'agence indique que&nbsp;<span style="font-size:12pt;color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">des <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">hacktivistes&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">ont&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">ciblé</span> des <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">systèmes&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">industriels</span>, <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">notamment</span> dans les <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">secteurs</span> de <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">l'énergie</span>, du transport, de <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">l'industrie&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">manufacturière</span> et la <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">chaîne&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">d'approvisionnement</span>. Le NCSC <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">recommande&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">l'adoption</span> du <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">programme</span> &quot;Cyber Essentials&quot;, un <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">certificat&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">officiel</span> qui <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">garantit&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">que</span> les <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">entreprises&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">appliquent</span> des <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">mesures</span> de base pour se <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">protéger&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">contre</span> les <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">cyberattaques</span>.</span><span style="font-size:12pt;color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></div><div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"></p><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"></span></p><div><div><p style="margin-bottom:13.3333px;"><strong></strong></p></div><div><span><a href="https://www.ncsc.gov.uk/files/ncsc-annual-review-2025.pdf" target="_blank" rel="noreferrer noopener"><span>https://www.ncsc.gov.uk/files/ncsc-annual-review-2025.pdf</span></a><span style="font-weight:bold;"><span>&nbsp;</span></span><span>&nbsp;</span></span><br/></div><div><span><span><br/></span></span></div><div><span><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span>Tendances et menaces cyber du secteur santé – 3e trimestre 2025 (Health-ISAC)</span></span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></span><br/></span></span></div><div><span><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"><br/></span></span></span></span></div><div><span><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"><div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"><span>Le rapport du Health-ISAC Q3 2025 </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">souligne </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">une </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">hausse</span><span> des </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">cybermenaces </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">visant</span><span> le </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">secteur</span><span> de la santé. Les </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">principales </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">concernent</span><span> la propagation du </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">ver</span><span> Shai-</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Hulud</span><span> via les packages JavaScript NPM, la </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">fraude</span><span> de faux </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">travailleurs</span><span> IT </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">nord-coréens</span><span>, les </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">campagnes</span><span> de phishing par QR codes, </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">ainsi</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">que</span><span> le </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">typosquatting</span><span>.</span></span><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"><span>Le </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">trimestre</span><span> a </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">également </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">été </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">marqué </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">par</span><span> la </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">découverte</span><span> de </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">vulnérabilités</span><span> critiques sur Citrix </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Netscaler</span><span> et Cisco ASA, </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">activement </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">exploitées</span><span> par des </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">acteurs</span><span> de la menace cyber.</span></span><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"><span>Sur le plan </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">réglementaire</span><span>, la FDA </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">renforce</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">ses</span><span> exigences pour les </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">dispositifs </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">médicaux</span><span>, </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">imposant </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">notamment</span><span> un SBOM (Software Bill </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Of</span><span> Materials).</span></span><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"><span>La </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">cybercriminalité </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">organisée </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">s’étend </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">en</span><span> Afrique, </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">tandis </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">que</span><span> les tensions </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">géopolitiques </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">en</span><span> Asie-Pacifique </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">augmentent</span><span> les </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">risques</span><span>.</span></span><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Enfin</span><span>, </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">plusieurs </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">cyberattaques</span><span> majeures </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">ont </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">visé</span><span> des </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">entités</span><span> de santé (Panama, France, États-Unis), </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">alors </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">que</span><span> les </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">épidémies</span><span> de dengue, chikungunya et virus du Nil occidental </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">continuent</span><span> de </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">perturber</span><span> la </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">logistique </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">hospitalière</span><span>.</span></span><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"><br/></span></p></div></div><span><a href="https://health-isac.org/wp-content/uploads/Health-ISAC-2025-Quarterly-Insights-Q3.pdf" target="_blank" rel="noreferrer noopener"><span>https://health-isac.org/wp-content/uploads/Health-ISAC-2025-Quarterly-Insights-Q3.pdf</span></a><span> &nbsp;</span></span><br/></span></span></span></span></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><br/></span></p><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnerability Corner :</span>&nbsp;<a href="https://content.blackkite.com/ebook/manufacturing-tprm-report-2025/" title="https://content.blackkite.com/ebook/manufacturing-tprm-report-2025/" rel=""></a></p></div></div></div></div></div><div><div style="clear:both;overflow:visible;direction:ltr;"><div><div><p style="margin-bottom:13.3333px;"><span>Liste des Known Exploited Vulnerabilities (KEV) publiés par l'agence de cybersécurité américaine CISA la semaine dernière :&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><div><table border="1"><tbody><tr><td style="vertical-align:top;width:144px;" class="zp-selected-cell"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:144px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:144px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:144px;"><div><p><strong>Liens&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-7836" target="_blank" rel="noreferrer noopener">CVE-2016-7836</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>SKYSEA&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Client View&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-7836%2C%20https%3A//www.skyseaclientview.net/news/161221/" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2016-7836, https://www.skyseaclientview.net/news/161221/</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24990" target="_blank" rel="noreferrer noopener">CVE-2025-24990</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Microsoft&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Windows&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24990%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-24990" target="_blank" rel="noreferrer noopener">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24990, https://nvd.nist.gov/vuln/detail/CVE-2025-24990</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-47827" target="_blank" rel="noreferrer noopener">CVE-2025-47827</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>IGEL&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>IGEL OS&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-47827%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-47827" target="_blank" rel="noreferrer noopener">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-47827, https://nvd.nist.gov/vuln/detail/CVE-2025-47827</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-54253" target="_blank" rel="noreferrer noopener">CVE-2025-54253</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Adobe&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Experience Manager (AEM) Forms&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="https://helpx.adobe.com/security/products/aem-forms/apsb25-82.html%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-54253" target="_blank" rel="noreferrer noopener">https://helpx.adobe.com/security/products/aem-forms/apsb25-82.html, https://nvd.nist.gov/vuln/detail/CVE-2025-54253</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59230" target="_blank" rel="noreferrer noopener">CVE-2025-59230</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Microsoft&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Windows&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59230%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-59230" target="_blank" rel="noreferrer noopener">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59230, https://nvd.nist.gov/vuln/detail/CVE-2025-59230</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-6264" target="_blank" rel="noreferrer noopener">CVE-2025-6264</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Rapid7&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Velociraptor&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="https://docs.velociraptor.app/announcements/advisories/cve-2025-6264/%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-6264" target="_blank" rel="noreferrer noopener">https://docs.velociraptor.app/announcements/advisories/cve-2025-6264/, https://nvd.nist.gov/vuln/detail/CVE-2025-6264</a>&nbsp;</p></div></td></tr></tbody></table></div><br/></div></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités de composants de systèmes industriels :&nbsp;</span></span><span>&nbsp;</span></p><table border="1"><tbody><tr><td style="vertical-align:top;width:82px;" class="zp-selected-cell"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Critical&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>High&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Medium&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Low&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Total&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1715 EtherNet/IP&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>2&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>2&nbsp;</p></div></td></tr></tbody></table></div><div><br/></div><div>Liste complète triée par CVSSv3 Score :&nbsp;</div><div><div style="margin-bottom:2px;"><div><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;" class="zp-selected-cell"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVSSv3 Score&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVSSv3 Severity&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>EPSS&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>Percentile&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CWE&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>1715 EtherNet/IP&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9177" target="_blank" rel="noreferrer noopener">CVE-2025-9177</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.042%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>12.589%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/770.html" target="_blank" rel="noreferrer noopener">CWE-770</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>1715 EtherNet/IP&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9178" target="_blank" rel="noreferrer noopener">CVE-2025-9178</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.042%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>12.589%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/787.html" target="_blank" rel="noreferrer noopener">CWE-787</a>&nbsp;</p></div></td></tr></tbody></table></div><br/></div></div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;</span></p><p style="margin-bottom:13.3333px;"><strong></strong></p><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Actualité Fortress Cybersecurity </span><span><span>&nbsp;</span><br/></span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-juin-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de juin 2025</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2025-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div></div><p></p></div></div><p></p></div></div></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;">- 6 <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">novembre</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">2025 :&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Cybersécurité</span> de la 5G <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">privée&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">en&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">environnement&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">industriel</span>, inscription </span><span style="line-height:20.7px;"><a href="https://events.teams.microsoft.com/event/9078c5c1-6c11-46de-b26f-10c9a073931d%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" title="lien" rel="">lien</a></span><span style="line-height:20.7px;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;">- 4 <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">décembre</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">2025 :</span> NIS 2 for Industry, inscription </span><span style="line-height:20.7px;"><a href="https://events.teams.microsoft.com/event/a70d0c3e-af20-4a3e-9b41-0a0f0f0a9d5e%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" title="lien" rel="">lien</a></span><span style="line-height:20.7px;">&nbsp;</span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 19 Oct 2025 21:45:57 +0200</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 25.S40]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-25.s40</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Menace cyber en augmentation contre les datacenters &nbsp; Les systèmes de refroidissement sont essentiels au bon fonctionnement des datacenters. Ces sy ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"></p><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Menace cyber en augmentation contre les datacenters</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Les systèmes de refroidissement sont essentiels au bon fonctionnement des datacenters. Ces systèmes, sont connectés aux plateformes de gestion des bâtiments (BMS) et deviennent donc des cibles idéales pour les attaques cyber. Selon techmonitor, des acteurs de la menace cyber commencent à cibler ces systèmes en manipulant les données de température et d'humidité.</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.techmonitor.ai/comment-2/data-centre-cooling-systems-cyberattack/" target="_blank" rel="noreferrer noopener"><span>https://www.techmonitor.ai/comment-2/data-centre-cooling-systems-cyberattack/</span></a><span>&nbsp;&nbsp;</span></p></div><div><p style="margin-bottom:16px;"><span style="font-weight:bold;"><span>Cyberattaque chez Asahi Group Holdings</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:16px;"><span>Asahi Group Holdings a subi une cyberattaque provoquant une panne de ses systèmes au Japon. Les opérations de commandes, d’expédition et les services clients sont actuellement suspendus. Aucune fuite de données personnelles n’a été confirmée pour l’instant. L’entreprise enquête et travaille à rétablir ses activités, sans donner encore de délai de rétablissement.&nbsp;</span></p></div><div><p style="margin-bottom:16px;"><a href="https://www.asahigroup-holdings.com/en/newsroom/detail/20250929-0202.html" target="_blank" rel="noreferrer noopener"><span>https://www.asahigroup-holdings.com/en/newsroom/detail/20250929-0202.html</span></a><span>&nbsp;&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Rapport ENISA : cybermenaces sur les systèmes industriels en Europe</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Le rapport intitulé &quot;ENISA Threat Landscape 2025&quot; créé par ENISA, l'agence de&nbsp;l'Union&nbsp;européenne&nbsp;de cybersécurité, s'appuie sur 4875 incidents analysés entre juillet 2024 et juin 2025. Ce rapport montre que les menaces visant les systèmes industriels en Europe représentent 18,2% des cas, et que les chaînes d'approvisionnement représentent 10,6% des cas. Le secteur manufacturier est ciblé par des groupes&nbsp;d'hacktivistes qui mènent&nbsp;<span>des attaques de DDoS,&nbsp;</span>des blocages et la perturbation de systèmes, comme celle de BlackBasta contre Medion AG en Allemagne fin 2024. Les cinq pays européens les plus touchés sont l'Allemagne (23.4%), l'Italie (11,33%), l'Espagne (9,8%), la France (9,5%) et la Belgique (3,7%).&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span><a href="https://www.enisa.europa.eu/sites/default/files/2025-10/ENISA%20Threat%20Landscape%202025.pdf" target="_blank" rel="noreferrer noopener"><span>https://www.enisa.europa.eu/sites/default/files/2025-10/ENISA%20Threat%20Landscape%202025.pdf</span></a><span> &nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Clés USB : gérer le risque cyber selon le NCCoE</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>L'utilisation des supports de stockage amovibles (clés USB) en environnement industriel a toujours posé un risque cyber. Malheureusement, dans certains contextes l'utilisation des clés USB est toujours obligatoire. Pour s'en protéger, le NCCoE propose des mesures de sécurité, les politiques d'autorisation, qui peut utiliser ces clés et dans quel but. Et aussi le contrôle physique, le stockage, chiffrement des données sensibles, scans des antivirus.&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1334.pdf" target="_blank" rel="noreferrer noopener"><span>https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1334.pdf</span></a><span> &nbsp;</span></p></div></div><p></p></div></div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:25.3px;"><strong>Vulnerability </strong><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;"><strong>Corner :</strong></span></span><span style="line-height:25.3px;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;"><span><span>Liste des Known Exploited Vulnerabilities (KEV) publiés par l'agence de cybersécurité américaine CISA la semaine dernière :&nbsp;&nbsp;</span></span></span></span></p><div><table border="1"><tbody><tr><td style="vertical-align:top;width:144px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:144px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:144px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:144px;"><div><p><strong>Liens&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2014-6278" target="_blank" rel="noreferrer noopener">CVE-2014-6278</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>GNU&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>GNU Bash&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-027%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2014-6278%2C%20https%3A//sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash%2C%20https%3A//support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/23467%2C%20https%3A//www.ibm.com/support/pages/security-bulletin-update-vulnerabilities-bash-affect-aix-toolbox-linux-applications-cve-2014-6271-cve-2014-6277-cve-2014-6278-cve-2014-7169-cve-2014-7186-and-cve-2014-7187" target="_blank" rel="noreferrer noopener">http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-027, https://nvd.nist.gov/vuln/detail/CVE-2014-6278, https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash, https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/23467, https://www.ibm.com/support/pages/security-bulletin-update-vulnerabilities-bash-affect-aix-toolbox-linux-applications-cve-2014-6271-cve-2014-6277-cve-2014-6278-cve-2014-7169-cve-2014-7186-and-cve-2014-7187</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-7755" target="_blank" rel="noreferrer noopener">CVE-2015-7755</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Juniper&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>ScreenOS&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-7755%2C%20https%3A//supportportal.juniper.net/s/article/2015-12-Out-of-Cycle-Security-Bulletin-ScreenOS-Multiple-Security-issues-with-ScreenOS-CVE-2015-7755-CVE-2015-7756" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2015-7755, https://supportportal.juniper.net/s/article/2015-12-Out-of-Cycle-Security-Bulletin-ScreenOS-Multiple-Security-issues-with-ScreenOS-CVE-2015-7755-CVE-2015-7756</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000353" target="_blank" rel="noreferrer noopener">CVE-2017-1000353</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Jenkins&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Jenkins&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000353%2C%20https%3A//www.jenkins.io/security/advisory/2017-04-26/" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2017-1000353, https://www.jenkins.io/security/advisory/2017-04-26/</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21311" target="_blank" rel="noreferrer noopener">CVE-2021-21311</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Adminer&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Adminer&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="https://github.com/vrana/adminer/security/advisories/GHSA-x5r2-hj5c-8jx6%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2021-21311" target="_blank" rel="noreferrer noopener">https://github.com/vrana/adminer/security/advisories/GHSA-x5r2-hj5c-8jx6, https://nvd.nist.gov/vuln/detail/CVE-2021-21311</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-10035" target="_blank" rel="noreferrer noopener">CVE-2025-10035</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Fortra&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>GoAnywhere MFT&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-10035%2C%20https%3A//www.fortra.com/security/advisories/product-security/fi-2025-012" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2025-10035, https://www.fortra.com/security/advisories/product-security/fi-2025-012</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-20352" target="_blank" rel="noreferrer noopener">CVE-2025-20352</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Cisco&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>IOS and IOS XE&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-20352%2C%20https%3A//sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2025-20352, https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21043" target="_blank" rel="noreferrer noopener">CVE-2025-21043</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Samsung&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Mobile Devices&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21043%2C%20https%3A//security.samsungmobile.com/securityUpdate.smsb?year=2025&amp;month=09" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2025-21043, https://security.samsungmobile.com/securityUpdate.smsb?year=2025&amp;month=09</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-32463" target="_blank" rel="noreferrer noopener">CVE-2025-32463</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Sudo&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Sudo&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-32463%2C%20https%3A//www.sudo.ws/security/advisories/chroot_bug/" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2025-32463, https://www.sudo.ws/security/advisories/chroot_bug/</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-4008" target="_blank" rel="noreferrer noopener">CVE-2025-4008</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Smartbedded&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Meteobridge&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="https://forum.meteohub.de/viewtopic.php?t=18687%2C%20https%3A%2F%2Fnvd.nist.gov%2Fvuln%2Fdetail%2FCVE-2025-4008" target="_blank" rel="noreferrer noopener">https://forum.meteohub.de/viewtopic.php?t=18687, https://nvd.nist.gov/vuln/detail/CVE-2025-4008</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59689" target="_blank" rel="noreferrer noopener">CVE-2025-59689</a>&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Libraesva&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p>Email Security Gateway&nbsp;</p></div></td><td style="vertical-align:top;width:144px;"><div><p><a href="https://docs.libraesva.com/knowledgebase/security-advisory-command-injection-vulnerability-cve-2025-59689/%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-59689" target="_blank" rel="noreferrer noopener">https://docs.libraesva.com/knowledgebase/security-advisory-command-injection-vulnerability-cve-2025-59689/, https://nvd.nist.gov/vuln/detail/CVE-2025-59689</a>&nbsp;</p></div></td></tr></tbody></table></div><div><br/></div><p style="color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"></p></div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><div style="margin-top:2px;margin-bottom:2px;overflow:visible;"><table border="1" style="table-layout:fixed;width:0px;empty-cells:show;overflow:visible;background:transparent;"><tbody></tbody></table></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:14pt;line-height:25.3px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Vulnérabilités</span><span> de </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">composants</span><span> de </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">systèmes </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">industriels</span><span> :&nbsp;</span></span><span style="font-size:14pt;line-height:25.3px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div><div><table border="1" style="table-layout:fixed;width:0px;empty-cells:show;overflow:visible;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;"><tbody></tbody></table></div>
<span><span style="line-height:20.7px;"><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;"><div><span style="line-height:20.7px;"><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;"><div><table border="1"><tbody><tr><td style="vertical-align:top;width:82px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Critical&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>High&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Medium&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Low&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Total&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>5&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>18&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>6&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>29&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>National Instruments&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Circuit Design Suite&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>2&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>2&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>LG Innotek&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>LG LND7210&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Megasys Enterprises&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Telenium Online Web Application&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>OpenPLC_V3&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>OpenPLC_V3&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr></tbody></table></div><br/></span></span></div>
<div><span style="line-height:20.7px;"><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Liste </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">complète </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">triée</span> par CVSSv3 <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Score :</span></span><span style="line-height:20.7px;">&nbsp;</span></div></span></span></span></div>
<div><div><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVSSv3 Score&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVSSv3 Severity&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>EPSS&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>Percentile&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CWE&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-10612" target="_blank" rel="noreferrer noopener">CVE-2018-10612</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.116%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>31.242%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/311.html" target="_blank" rel="noreferrer noopener">CWE-311</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-13548" target="_blank" rel="noreferrer noopener">CVE-2019-13548</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>3.809%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>87.683%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/787.html" target="_blank" rel="noreferrer noopener">CWE-787</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-18858" target="_blank" rel="noreferrer noopener">CVE-2019-18858</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.522%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>66.098%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/120.html" target="_blank" rel="noreferrer noopener">CWE-120</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10245" target="_blank" rel="noreferrer noopener">CVE-2020-10245</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.825%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>73.773%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/787.html" target="_blank" rel="noreferrer noopener">CWE-787</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33485" target="_blank" rel="noreferrer noopener">CVE-2021-33485</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.543%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>66.917%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/787.html" target="_blank" rel="noreferrer noopener">CWE-787</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Megasys Enterprises&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Telenium Online Web Application&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-10659" target="_blank" rel="noreferrer noopener">CVE-2025-10659</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.754%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>72.466%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener">CWE-78</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9008" target="_blank" rel="noreferrer noopener">CVE-2019-9008</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.688%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>71.005%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/732.html" target="_blank" rel="noreferrer noopener">CWE-732</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9013" target="_blank" rel="noreferrer noopener">CVE-2019-9013</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.180%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>40.133%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/327.html" target="_blank" rel="noreferrer noopener">CWE-327</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>LG Innotek&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>LG LND7210&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-10538" target="_blank" rel="noreferrer noopener">CVE-2025-10538</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.6&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.073%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>22.883%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/288.html" target="_blank" rel="noreferrer noopener">CWE-288</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22515" target="_blank" rel="noreferrer noopener">CVE-2022-22515</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.1&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.092%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>27.014%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/668.html" target="_blank" rel="noreferrer noopener">CWE-668</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-12069" target="_blank" rel="noreferrer noopener">CVE-2020-12069</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.032%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.160%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/916.html" target="_blank" rel="noreferrer noopener">CWE-916</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>National Instruments&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Circuit Design Suite&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-6033" target="_blank" rel="noreferrer noopener">CVE-2025-6033</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.015%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>2.153%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/843.html" target="_blank" rel="noreferrer noopener">CWE-843</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>National Instruments&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Circuit Design Suite&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-6034" target="_blank" rel="noreferrer noopener">CVE-2025-6034</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.015%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>2.153%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener">CWE-125</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20025" target="_blank" rel="noreferrer noopener">CVE-2018-20025</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>1.535%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>80.766%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/330.html" target="_blank" rel="noreferrer noopener">CWE-330</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-13532" target="_blank" rel="noreferrer noopener">CVE-2019-13532</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>2.387%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>84.497%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/22.html" target="_blank" rel="noreferrer noopener">CWE-22</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-5105" target="_blank" rel="noreferrer noopener">CVE-2019-5105</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.339%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>56.188%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/787.html" target="_blank" rel="noreferrer noopener">CWE-787</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9009" target="_blank" rel="noreferrer noopener">CVE-2019-9009</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.381%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>58.953%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/755.html" target="_blank" rel="noreferrer noopener">CWE-755</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9012" target="_blank" rel="noreferrer noopener">CVE-2019-9012</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.283%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>51.560%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/770.html" target="_blank" rel="noreferrer noopener">CWE-770</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-12067" target="_blank" rel="noreferrer noopener">CVE-2020-12067</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.059%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>18.733%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/640.html" target="_blank" rel="noreferrer noopener">CWE-640</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-15806" target="_blank" rel="noreferrer noopener">CVE-2020-15806</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.591%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>68.412%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/401.html" target="_blank" rel="noreferrer noopener">CWE-401</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29241" target="_blank" rel="noreferrer noopener">CVE-2021-29241</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.562%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>67.521%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/476.html" target="_blank" rel="noreferrer noopener">CWE-476</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36763" target="_blank" rel="noreferrer noopener">CVE-2021-36763</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.322%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>54.895%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/552.html" target="_blank" rel="noreferrer noopener">CWE-552</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36764" target="_blank" rel="noreferrer noopener">CVE-2021-36764</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.336%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>55.977%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/476.html" target="_blank" rel="noreferrer noopener">CWE-476</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22517" target="_blank" rel="noreferrer noopener">CVE-2022-22517</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>1.034%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>76.701%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/330.html" target="_blank" rel="noreferrer noopener">CWE-330</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22519" target="_blank" rel="noreferrer noopener">CVE-2022-22519</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>1.306%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>79.154%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/126.html" target="_blank" rel="noreferrer noopener">CWE-126</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29242" target="_blank" rel="noreferrer noopener">CVE-2021-29242</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.438%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>62.425%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/20.html" target="_blank" rel="noreferrer noopener">CWE-20</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22514" target="_blank" rel="noreferrer noopener">CVE-2022-22514</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.1&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.683%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>70.909%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/822.html" target="_blank" rel="noreferrer noopener">CWE-822</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>OpenPLC_V3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>OpenPLC_V3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-54811" target="_blank" rel="noreferrer noopener">CVE-2025-54811</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.1&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.028%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6.683%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/758.html" target="_blank" rel="noreferrer noopener">CWE-758</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-0739" target="_blank" rel="noreferrer noopener">CVE-2018-0739</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.667%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>91.587%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/674.html" target="_blank" rel="noreferrer noopener">CWE-674</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-13542" target="_blank" rel="noreferrer noopener">CVE-2019-13542</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.238%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>47.060%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/476.html" target="_blank" rel="noreferrer noopener">CWE-476</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7052" target="_blank" rel="noreferrer noopener">CVE-2020-7052</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.755%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>72.493%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/770.html" target="_blank" rel="noreferrer noopener">CWE-770</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22513" target="_blank" rel="noreferrer noopener">CVE-2022-22513</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.548%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>67.084%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/476.html" target="_blank" rel="noreferrer noopener">CWE-476</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-3735" target="_blank" rel="noreferrer noopener">CVE-2017-3735</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>5.3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.772%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>92.207%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/119.html" target="_blank" rel="noreferrer noopener">CWE-119</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Festo&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Festo Firmware (R05 (17.06.2016) = 2.3.8.0) installed on Festo Hardware Controller CECC-D (All versions)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9011" target="_blank" rel="noreferrer noopener">CVE-2019-9011</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>5.3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.066%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>20.816%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/668.html" target="_blank" rel="noreferrer noopener">CWE-668</a>&nbsp;</p></div></td></tr></tbody></table></div><br/></div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;">-----&nbsp; </span><span style="line-height:20.7px;"><span>&nbsp;</span><br/></span><span style="line-height:28.75px;">Actualité Fortress Cybersecurity </span><span style="line-height:28.75px;"><span>&nbsp;</span><br/></span><span style="line-height:20.7px;"><span>Nos </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">dernières </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">publications :</span></span></p><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;"><span></span></span></span></p><div><p><a href="https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-25.s37"></a></p></div>
</div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-juin-2025" target="_blank" rel="noreferrer noopener"><span style="line-height:20.7px;">- Bilan des Known Exploited Vulnerabilities du mois de juin 2025</span></a><span style="line-height:20.7px;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span style="line-height:20.7px;">- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span style="line-height:20.7px;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2025-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span style="line-height:20.7px;">Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span style="line-height:20.7px;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"><span>- 6 </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">novembre</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">2025 :&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Cybersécurité</span><span> de la 5G </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">privée&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">en&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">environnement&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">industriel</span><span>, inscription </span></span><a href="https://events.teams.microsoft.com/event/9078c5c1-6c11-46de-b26f-10c9a073931d%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span style="line-height:20.7px;">lien</span></a><span style="line-height:20.7px;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"><span>- 4 </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">décembre</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">2025 :</span><span> NIS 2 for Industry, inscription </span></span><a href="https://events.teams.microsoft.com/event/a70d0c3e-af20-4a3e-9b41-0a0f0f0a9d5e%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span style="line-height:20.7px;">lien</span></a><span style="line-height:20.7px;">&nbsp;</span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 06 Oct 2025 07:38:27 +0200</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 25.S39]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-25.s39</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Mise à jour de l'incident Jaguar Land Rover &nbsp; Début septembre 2025, la&nbsp;fabriquant&nbsp;d'automobiles Jaguar Land Rover (JLR), a été victime d ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;"></span></span><span style="line-height:20.7px;"><strong>Mise à jour de </strong><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;"><strong>l'incident</strong></span><strong> Jaguar Land Rover</strong></span><span style="line-height:20.7px;">&nbsp;</span><span style="line-height:20.7px;"></span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"><span></span></span><span style="line-height:20.7px;"><span></span></span><span style="line-height:20.7px;">Début septembre 2025, la&nbsp;fabriquant&nbsp;d'automobiles Jaguar Land Rover (JLR), a été victime d'une cyberattaque. L'acteur de la menace qui a ciblé JLR n'est pas encore confirmé. JLR perd actuellement environ 50 millions euros par semaine à cause de la cyberattaque. Toutes ses usines, au Royaume-Uni, en Slovaquie et en Chine, ont dû arrêter la production et la reprise complète est prévue en novembre 2025.</span><span style="line-height:20.7px;">&nbsp;</span><span style="line-height:20.7px;"></span><span style="line-height:20.7px;"></span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span><a href="https://www.cybersecuritydive.com/news/bridgestone-americas-restores-facilities-network-connections-following-cyb/760381/" target="_blank" rel="noreferrer noopener"><span style="line-height:20.7px;"><span></span></span></a><a href="https://www.bbc.com/news/articles/czewlj57e24o" target="_blank" rel="noreferrer noopener"><span style="line-height:20.7px;"><span>https://www.bbc.com/news/articles/czewlj57e24o</span></span></a><span style="line-height:20.7px;">&nbsp;</span></p><p style="color:windowtext;font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:transparent;margin-bottom:13.3333px;vertical-align:baseline;"></p><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-top:16px;margin-bottom:16px;vertical-align:baseline;"><span style="line-height:20.7px;"><strong>EDR-Freeze : un outil qui plonge les EDR et antivirus dans un état de coma</strong></span><span style="line-height:20.7px;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-top:16px;margin-bottom:16px;vertical-align:baseline;"><span style="line-height:20.7px;">EDR-Freeze est un outil qui met temporairement en pause les processus d’antivirus/EDR en exploitant <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">WerFaultSecure</span> (Windows <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Error </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Reporting</span>) et la fonction <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">MiniDumpWriteDump</span>, qui suspend tous les threads d’un processus lors d’un vidage mémoire. La méthode crée une condition pour suspendre à la fois le <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">dumpeur</span> et la cible, laissant l’agent de sécurité inactif pendant un laps de temps contrôlé. EDR-Freeze permet ainsi de neutraliser temporairement un agent de sécurité pour effectuer des actions avant de le réactiver. Cette technique est plus discrète que BYOVD (<span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Bring</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Your</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Own</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Vulnerable</span> Driver) mais requiert des privilèges élevés (Admin/System).</span><span style="line-height:20.7px;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><a href="https://www.zerosalarium.com/2025/09/EDR-Freeze-Puts-EDRs-Antivirus-Into-Coma.html" target="_blank" rel="noreferrer noopener"><span style="line-height:20.7px;"><span>https://www.zerosalarium.com/2025/09/EDR-Freeze-Puts-EDRs-Antivirus-Into-Coma.html</span></span></a><span style="line-height:20.7px;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-top:16px;margin-bottom:16px;vertical-align:baseline;"><span style="line-height:20.7px;"><strong>Décrypter Salt </strong><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;"><strong>Typhoon</strong></span><strong> : collaboration entre entreprises chinoises et APT</strong></span><span style="line-height:20.7px;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-top:16px;margin-bottom:16px;vertical-align:baseline;"><span style="line-height:20.7px;">La publication détaille les activités de l'acteur de la menace cyber Salt <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Typhoon, ainsi que les liens entre des entreprises chinoises qui proposent des solutions et des services à ces acteurs</span>. En effet, le rapport met en évidence trois entreprises chinoises – Sichuan <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Juxinhe</span>, Beijing <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Huanyu</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Tianqiong</span> et Sichuan <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Zhixin</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Ruijie</span> – sont identifiées comme fournisseurs de services à&nbsp;&nbsp;</span>Salt&nbsp;Typhoon mais également à d'autres acteurs tels que&nbsp;OPERATOR PANDA, RedMike, UNC5807 et GhostEmperor. L’étude montre que Sichuan <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Zhixin </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Ruijie</span> a volontairement réduit sa visibilité en ligne, probablement sous pression de ses clients militaires et gouvernementaux. <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Le bulletin d'alerte</span>&nbsp;du 27 août 2025 évite de nommer un seul groupe, parlant d’APT <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">actors</span>, car les méthodes d’attribution divergent selon les agences. Cette ambiguïté illustre la difficulté d’identifier précisément les responsables, tout en confirmant l’implication d’acteurs liés à des organisations étatiques chinoises.</p><p></p></div>
<div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-top:16px;margin-bottom:16px;vertical-align:baseline;"><a href="https://nattothoughts.substack.com/p/who-is-salt-typhoon-really-unraveling" target="_blank" rel="noreferrer noopener"><span style="line-height:20.7px;"><span>https://nattothoughts.substack.com/p/who-is-salt-typhoon-really-unraveling</span></span></a><span style="line-height:20.7px;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-top:16px;margin-bottom:16px;vertical-align:baseline;"><span style="line-height:20.7px;"><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;"><strong>Ontinue</strong></span><strong> : rapport du premier semestre 2025</strong></span><span style="line-height:20.7px;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-top:16px;margin-bottom:16px;vertical-align:baseline;"><span style="line-height:20.7px;"><span>Selon les équipes Advanced </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Threat</span><span> Operations (ATO) d'</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">ontinue</span><span>, les cyberattaques continuent de s'augmenter. 20% des compromissions sont liées au vol et la réutilisation de jetons d'authentification malgré l'authentification </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">multifacteur</span><span> (MFA), et 70% des </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">emails</span><span> de phishing arrivent malgré les filtres. Les virus transmis par clé USB ont augmenté de 27%, et 30% des incidents sont liés à un niveau de protection insuffisant chez des fournisseurs externes. </span></span><span style="line-height:20.7px;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-top:16px;margin-bottom:16px;vertical-align:baseline;"><a href="https://www.ontinue.com/wp-content/uploads/2025/09/2025_1H-Threat-Intelligence-Report.pdf" target="_blank" rel="noreferrer noopener"><span style="line-height:20.7px;"><span>https://www.ontinue.com/wp-content/uploads/2025/09/2025_1H-Threat-Intelligence-Report.pdf</span></span></a><span style="line-height:20.7px;">&nbsp;</span></p></div>
</div><p style="color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"></p></div>
</div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:25.3px;">Vulnerability <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Corner :</span></span><span style="line-height:25.3px;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Liste</span><span> des Known Exploited Vulnerabilities (KEV) </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">publiés</span><span> par </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">l'agence</span><span> de </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">cybersécurité</span><span> américaine CISA la </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">semaine&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">dernière</span><span> :&nbsp;</span></span><span style="line-height:20.7px;">&nbsp;</span></p><p style="color:windowtext;font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:transparent;margin-bottom:13.3333px;vertical-align:baseline;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p><div><table border="1" style="table-layout:fixed;width:0px;empty-cells:show;overflow:visible;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;"><tbody><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:160px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;"><strong>C</strong></span><span style="line-height:18px;font-size:16px;"><strong>VE</strong></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:101.156px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;"><strong>Vendor</strong></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:221.844px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;"><strong>Product</strong></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:802.719px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;"><strong>Liens</strong></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:160px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-10585" target="_blank" rel="noreferrer noopener"><span style="line-height:18px;"><span style="font-size:16px;">CVE-2025-10585</span></span></a><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:101.156px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">Google</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:221.844px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">Chromium V8</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:802.719px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><a href="https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_17.html%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-10585" target="_blank" rel="noreferrer noopener"><span style="line-height:18px;"><span style="font-size:16px;">https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_17.html, https://nvd.nist.gov/vuln/detail/CVE-2025-10585</span></span></a><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:160px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-20333" target="_blank" rel="noreferrer noopener"><span style="line-height:18px;"><span style="font-size:16px;">CVE-2025-20333</span></span></a><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:101.156px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">Cisco</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:221.844px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:802.719px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-20333%2C%20https%3A//sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-z5xP8EUB%2C%20https%3A//sec.cloudapps.cisco.com/security/center/private/resources/asa_ftd_continued_attacks#Details%2C%20https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks%2C%20https://www.cisa.gov/eviction-strategies-tool/create-from-template%2C%20https://www.cisa.gov/news-events/directives/ed-25-03-identify-and-mitigate-potential-compromise-cisco-devices%2C%20https://www.cisa.gov/news-events/directives/supplemental-direction-ed-25-03-core-dump-and-hunt-instructions" target="_blank" rel="noreferrer noopener"><span style="line-height:18px;"><span style="font-size:16px;">https://nvd.nist.gov/vuln/detail/CVE-2025-20333, https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-z5xP8EUB, https://sec.cloudapps.cisco.com/security/center/private/resources/asa_ftd_continued_attacks#Details, https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks, https://www.cisa.gov/eviction-strategies-tool/create-from-template, https://www.cisa.gov/news-events/directives/ed-25-03-identify-and-mitigate-potential-compromise-cisco-devices, https://www.cisa.gov/news-events/directives/supplemental-direction-ed-25-03-core-dump-and-hunt-instructions</span></span></a><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:160px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-20362" target="_blank" rel="noreferrer noopener"><span style="line-height:18px;"><span style="font-size:16px;">CVE-2025-20362</span></span></a><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:101.156px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">Cisco</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:221.844px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:802.719px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-20362%2C%20https%3A//sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-YROOTUW%2C%20https%3A//sec.cloudapps.cisco.com/security/center/private/resources/asa_ftd_continued_attacks#Details%2C%20https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks%2C%20https://www.cisa.gov/eviction-strategies-tool/create-from-template%2C%20https://www.cisa.gov/news-events/directives/ed-25-03-identify-and-mitigate-potential-compromise-cisco-devices%2C%20https://www.cisa.gov/news-events/directives/supplemental-direction-ed-25-03-core-dump-and-hunt-instructions" target="_blank" rel="noreferrer noopener"><span style="line-height:18px;"><span style="font-size:16px;">https://nvd.nist.gov/vuln/detail/CVE-2025-20362, https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-YROOTUW, https://sec.cloudapps.cisco.com/security/center/private/resources/asa_ftd_continued_attacks#Details, https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks, https://www.cisa.gov/eviction-strategies-tool/create-from-template, https://www.cisa.gov/news-events/directives/ed-25-03-identify-and-mitigate-potential-compromise-cisco-devices, https://www.cisa.gov/news-events/directives/supplemental-direction-ed-25-03-core-dump-and-hunt-instructions</span></span></a><span style="line-height:18px;">&nbsp;</span></span></p></div></div></td></tr></tbody></table></div><br/><p style="color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"></p></div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><div style="margin-top:2px;margin-bottom:2px;overflow:visible;"><table border="1" style="table-layout:fixed;width:0px;empty-cells:show;overflow:visible;background:transparent;"><tbody></tbody></table></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:14pt;line-height:25.3px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Vulnérabilités</span><span> de </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">composants</span><span> de </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">systèmes </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">industriels</span><span> :&nbsp;</span></span><span style="font-size:14pt;line-height:25.3px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div><div><table border="1" style="table-layout:fixed;width:0px;empty-cells:show;overflow:visible;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;"><tbody></tbody></table></div>
<div><table border="1" style="table-layout:fixed;width:0px;empty-cells:show;overflow:visible;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;"><tbody><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:151px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;"><strong>V</strong></span><span style="line-height:18px;font-size:16px;"><strong>endor</strong></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:524px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;"><strong>Product</strong></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:109.922px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;"><strong>Critical</strong></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:120.344px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;"><strong>High</strong></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:125.203px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;"><strong>Medium</strong></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:126.062px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;"><strong>Low</strong></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:140.406px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;"><strong>Total</strong></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:151px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;"><span style="background-position:0px 100%;background-repeat:repeat-x;font-size:16px;background-image:none !important;">AutomationDirect</span></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:524px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">CLICK PLUS C0-0x CPU firmware</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:109.922px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">0</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:120.344px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">2</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:125.203px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">5</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:126.062px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">0</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:140.406px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">7</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:151px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">Viessmann</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:524px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;"><span style="background-position:0px 100%;background-repeat:repeat-x;font-size:16px;background-image:none !important;">Vitogate</span><span style="font-size:16px;"> 300</span></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:109.922px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">0</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:120.344px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">1</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:125.203px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">1</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:126.062px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">0</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:140.406px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">2</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:151px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">Mitsubishi Electric</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:524px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">MELSEC-Q Series Q03UDVCPU</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:109.922px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">0</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:120.344px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">0</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:125.203px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">1</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:126.062px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">0</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:140.406px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;"><span style="font-size:16px;">1</span></span><span style="line-height:18px;">&nbsp;</span></span></p></div></div></td></tr></tbody></table></div><span><span style="line-height:20.7px;"><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;"><div><span style="line-height:20.7px;"><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;"><br/></span></span></div>
<div><span style="line-height:20.7px;"><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Liste </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">complète </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">triée</span> par CVSSv3 <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Score :</span></span><span style="line-height:20.7px;">&nbsp;</span></div></span></span></span></div>
<div><div><table border="1" style="table-layout:fixed;width:0px;empty-cells:show;overflow:visible;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;"><tbody><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:154px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;"><strong>Vendor</strong></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:289.016px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;"><strong>Product</strong></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:208.984px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;"><strong>CVE</strong></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:139.984px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;"><strong>CVSSv3 Score</strong></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:157.031px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;"><strong>CVSSv3 Severity</strong></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:107.891px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;"><strong>EPSS</strong></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:106.953px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;"><strong>Percentile</strong></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:111.047px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;"><strong>CWE</strong></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:154px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">Viessmann</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:289.016px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;"><span style="background-position:0px 100%;background-repeat:repeat-x;font-size:16px;background-image:none !important;">Vitogate</span><span style="font-size:16px;"> 300</span></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:208.984px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9495" target="_blank" rel="noreferrer noopener"><span style="line-height:18px;"><span style="font-size:16px;">CVE-2025-9495</span></span></a><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:139.984px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">8.8</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:157.031px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">HIGH</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:107.891px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">0.033%</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:106.953px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">8.053%</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:111.047px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><a href="https://cwe.mitre.org/data/definitions/602.html" target="_blank" rel="noreferrer noopener"><span style="line-height:18px;"><span style="font-size:16px;">CWE-602</span></span></a><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:154px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;"><span style="background-position:0px 100%;background-repeat:repeat-x;font-size:16px;background-image:none !important;">AutomationDirect</span></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:289.016px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">CLICK PLUS C0-0x CPU firmware</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:208.984px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-55069" target="_blank" rel="noreferrer noopener"><span style="line-height:18px;"><span style="font-size:16px;">CVE-2025-55069</span></span></a><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:139.984px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">8.3</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:157.031px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">HIGH</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:107.891px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;"><span style="font-size:16px;">0.038%</span></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:106.953px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;"><span style="font-size:16px;">10.706%</span></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:111.047px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><a href="https://cwe.mitre.org/data/definitions/337.html" target="_blank" rel="noreferrer noopener"><span style="line-height:18px;"><span style="font-size:16px;">CWE-337</span></span></a><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:154px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;"><span style="background-position:0px 100%;background-repeat:repeat-x;font-size:16px;background-image:none !important;">AutomationDirect</span></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:289.016px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">CLICK PLUS C0-0x CPU firmware</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:208.984px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59484" target="_blank" rel="noreferrer noopener"><span style="line-height:18px;"><span style="font-size:16px;">CVE-2025-59484</span></span></a><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:139.984px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">8.3</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:157.031px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">HIGH</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:107.891px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;"><span style="font-size:16px;">0.015%</span></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:106.953px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;"><span style="font-size:16px;">2.122%</span></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:111.047px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><a href="https://cwe.mitre.org/data/definitions/327.html" target="_blank" rel="noreferrer noopener"><span style="line-height:18px;"><span style="font-size:16px;">CWE-327</span></span></a><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:154px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;"><span style="background-position:0px 100%;background-repeat:repeat-x;font-size:16px;background-image:none !important;">AutomationDirect</span></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:289.016px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">CLICK PLUS C0-0x CPU firmware</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:208.984px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-55038" target="_blank" rel="noreferrer noopener"><span style="line-height:18px;"><span style="font-size:16px;">CVE-2025-55038</span></span></a><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:139.984px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">6.8</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:157.031px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">MEDIUM</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:107.891px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;"><span style="font-size:16px;">0.023%</span></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:106.953px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;"><span style="font-size:16px;">4.605%</span></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:111.047px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer noopener"><span style="line-height:18px;"><span style="font-size:16px;">CWE-862</span></span></a><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:154px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">Mitsubishi Electric</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:289.016px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">MELSEC-Q Series Q03UDVCPU</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:208.984px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-8531" target="_blank" rel="noreferrer noopener"><span style="line-height:18px;"><span style="font-size:16px;">CVE-2025-8531</span></span></a><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:139.984px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">6.8</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:157.031px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">MEDIUM</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:107.891px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">0.166%</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:106.953px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">38.298%</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:111.047px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><a href="https://cwe.mitre.org/data/definitions/130.html" target="_blank" rel="noreferrer noopener"><span style="line-height:18px;"><span style="font-size:16px;">CWE-130</span></span></a><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:154px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">Viessmann</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:289.016px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;"><span style="background-position:0px 100%;background-repeat:repeat-x;font-size:16px;background-image:none !important;">Vitogate</span><span style="font-size:16px;"> 300</span></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:208.984px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9494" target="_blank" rel="noreferrer noopener"><span style="line-height:18px;"><span style="font-size:16px;">CVE-2025-9494</span></span></a><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:139.984px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">6.8</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:157.031px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">MEDIUM</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:107.891px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;"><span style="font-size:16px;">0.328%</span></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:106.953px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;"><span style="font-size:16px;">55.116%</span></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:111.047px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span style="line-height:18px;"><span style="font-size:16px;">CWE-78</span></span></a><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:154px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;"><span style="background-position:0px 100%;background-repeat:repeat-x;font-size:16px;background-image:none !important;">AutomationDirect</span></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:289.016px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">CLICK PLUS C0-0x CPU firmware</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:208.984px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-57882" target="_blank" rel="noreferrer noopener"><span style="line-height:18px;"><span style="font-size:16px;">CVE-2025-57882</span></span></a><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:139.984px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">5.9</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:157.031px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">MEDIUM</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:107.891px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;"><span style="font-size:16px;">0.041%</span></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:106.953px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;"><span style="font-size:16px;">11.727%</span></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:111.047px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><a href="https://cwe.mitre.org/data/definitions/404.html" target="_blank" rel="noreferrer noopener"><span style="line-height:18px;"><span style="font-size:16px;">CWE-404</span></span></a><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:154px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;"><span style="background-position:0px 100%;background-repeat:repeat-x;font-size:16px;background-image:none !important;">AutomationDirect</span></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:289.016px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">CLICK PLUS C0-0x CPU firmware</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:208.984px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58473" target="_blank" rel="noreferrer noopener"><span style="line-height:18px;"><span style="font-size:16px;">CVE-2025-58473</span></span></a><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:139.984px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">5.9</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:157.031px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">MEDIUM</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:107.891px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;"><span style="font-size:16px;">0.054%</span></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:106.953px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;"><span style="font-size:16px;">17.149%</span></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:111.047px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><a href="https://cwe.mitre.org/data/definitions/404.html" target="_blank" rel="noreferrer noopener"><span style="line-height:18px;"><span style="font-size:16px;">CWE-404</span></span></a><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:154px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;"><span style="background-position:0px 100%;background-repeat:repeat-x;font-size:16px;background-image:none !important;">AutomationDirect</span></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:289.016px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">CLICK PLUS C0-0x CPU firmware</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:208.984px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58069" target="_blank" rel="noreferrer noopener"><span style="line-height:18px;"><span style="font-size:16px;">CVE-2025-58069</span></span></a><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:139.984px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">5.3</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:157.031px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">MEDIUM</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:107.891px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;"><span style="font-size:16px;">0.028%</span></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:106.953px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;"><span style="font-size:16px;">6.427%</span></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:111.047px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><a href="https://cwe.mitre.org/data/definitions/321.html" target="_blank" rel="noreferrer noopener"><span style="line-height:18px;"><span style="font-size:16px;">CWE-321</span></span></a><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:154px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;"><span style="background-position:0px 100%;background-repeat:repeat-x;font-size:16px;background-image:none !important;">AutomationDirect</span></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:289.016px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">CLICK PLUS C0-0x CPU firmware</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:208.984px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-54855" target="_blank" rel="noreferrer noopener"><span style="line-height:18px;"><span style="font-size:16px;">CVE-2025-54855</span></span></a><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:139.984px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">4.2</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:157.031px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;font-size:16px;">MEDIUM</span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:107.891px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;"><span style="font-size:16px;">0.008%</span></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:106.953px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><span style="line-height:18px;"><span style="font-size:16px;">0.488%</span></span><span style="line-height:18px;">&nbsp;</span></span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:111.047px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;"><span style="color:rgb(0, 0, 0);"><a href="https://cwe.mitre.org/data/definitions/312.html" target="_blank" rel="noreferrer noopener"><span style="line-height:18px;"><span style="font-size:16px;">CWE-312</span></span></a><span style="line-height:18px;">&nbsp;</span></span></p></div></div></td></tr></tbody></table></div><br/></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;">-----&nbsp; </span><span style="line-height:20.7px;"><span>&nbsp;</span><br/></span><span style="line-height:28.75px;">Actualité Fortress Cybersecurity </span><span style="line-height:28.75px;"><span>&nbsp;</span><br/></span><span style="line-height:20.7px;"><span>Nos </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">dernières </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">publications :</span></span></p><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;"><span></span></span></span></p><div><p><a href="https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-25.s37"></a></p></div>
</div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-juin-2025" target="_blank" rel="noreferrer noopener"><span style="line-height:20.7px;">- Bilan des Known Exploited Vulnerabilities du mois de juin 2025</span></a><span style="line-height:20.7px;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span style="line-height:20.7px;">- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span style="line-height:20.7px;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2025-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span style="line-height:20.7px;">Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span style="line-height:20.7px;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"><span>- 3&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">octobre</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">2025 :&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Construire</span><span> le plan de protection </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">contre</span><span> la menace </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">cyber</span><span> de </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">ses</span><span> installations </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">industrielles</span><span>, inscription </span></span><a href="https://events.teams.microsoft.com/event/28618490-348d-42b3-a405-715ced3a9c0d%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span style="line-height:20.7px;">lien</span></a><span style="line-height:20.7px;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"><span>- 6 </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">novembre</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">2025 :&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Cybersécurité</span><span> de la 5G </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">privée&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">en&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">environnement&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">industriel</span><span>, inscription </span></span><a href="https://events.teams.microsoft.com/event/9078c5c1-6c11-46de-b26f-10c9a073931d%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span style="line-height:20.7px;">lien</span></a><span style="line-height:20.7px;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"><span>- 4 </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">décembre</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">2025 :</span><span> NIS 2 for Industry, inscription </span></span><a href="https://events.teams.microsoft.com/event/a70d0c3e-af20-4a3e-9b41-0a0f0f0a9d5e%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span style="line-height:20.7px;">lien</span></a><span style="line-height:20.7px;">&nbsp;</span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div></div><p></p></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 28 Sep 2025 18:24:40 +0200</pubDate></item></channel></rss>