<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.fortress-cybersecurity.fr/blogs/author/sabri-khemissa/feed" rel="self" type="application/rss+xml"/><title>Site Institutionnel - Blog by Sabri Khemissa</title><description>Site Institutionnel - Blog by Sabri Khemissa</description><link>https://www.fortress-cybersecurity.fr/blogs/author/sabri-khemissa</link><lastBuildDate>Mon, 11 May 2026 06:00:11 +0200</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Bilan des Known Exploited Vulnerabilities du mois d'avril 2026]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-d-avril-2026</link><description><![CDATA[ ⚠️&nbsp; En Avril 2026, l’agence de cybersécurité américaine (CISA) a ajouté 31 vulnérabilités, identifiées comme activement exploitées dans le cadre ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_oDkejEquSTCm9QqUenH7tg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_SIKykFb_TsWa-AUxhhWfNw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_QFmKC9SjRNSAyKRyxg67gg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_7SNFdUZukMdrsRG_8B6vOg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><p></p><p><span><span></span></span></p><p><span><span></span></span></p><p></p><div><p></p><div><p></p><div><div></div></div><div><div>⚠️&nbsp; En Avril 2026, l’agence de cybersécurité américaine (CISA) a ajouté 31 vulnérabilités, identifiées comme activement exploitées dans le cadre de cyberattaques, dans sa liste des Known Exploited Vulnerabilities (KEV), le nombre de KEV est en hausse +5 par rapport au mois précédent.</div><div><br/></div><div>Après plusieurs mois de stabilisation, voire de basse, la tendance générale est en hausse.</div><span><img src="/Tue%20May%2005%202026.png" alt=""/></span><br/><div><br/></div><div><p>☣️&nbsp;3 x KEV exploitées par un ransomware sur les produits des éditeurs suivants ; JetBrains, Microsoft, PaperCut</p><p><br/></p><p>🔥 Editeurs concernés par les KEV : Adobe, Apache, Cisco, ConnectWise, D-Link, Fortinet, Ivanti, Kentico, Marimo, Microsoft, Quest, Samsung, SimpleHelp , Synacor, TrueConf, WebPros.</p></div><div></div><br/><div>À date, 1587 KEV sont référencées.</div><div><br/></div><div>🎆 L'objectif de cette liste est de permettre aux organisations de prioriser leurs actions de patching. Afin de se rendre compte de l'importance des nouvelles entrées dans cette liste : toutes les agences de l’administration américaine doivent corriger ces vulnérabilités dans les 21 jours qui suivent l'ajout dans la liste !</div><div><br/></div><div>☣️&nbsp; KEV exploitées par un ransomware :</div><div>1 x JetBrains :</div><div>&nbsp; TeamCity (CVE-2024-27199)</div><div>1 x Microsoft :</div><div>&nbsp; Exchange Server (CVE-2023-21529)</div><div>1 x PaperCut :</div><div>&nbsp; NG/MF (CVE-2023-27351)</div><div><br/></div><div>🔥 Liste des autres KEV :</div><div>3 × Cisco :</div><div>&nbsp; Catalyst SD-WAN Manger (CVE-2026-20122)</div><div>&nbsp; Catalyst SD-WAN Manager (CVE-2026-20133)</div><div>&nbsp; Catalyst SD-WAN Manager (CVE-2026-20128)</div><div>2 × Adobe :</div><div>&nbsp; Acrobat (CVE-2020-9715)</div><div>&nbsp; Acrobat and Reader (CVE-2026-34621)</div><div>2 × Fortinet :</div><div>&nbsp; FortiClient EMS (CVE-2026-21643)</div><div>&nbsp; FortiClient EMS (CVE-2026-35616)</div><div>2 × SimpleHelp&nbsp; :</div><div>&nbsp; SimpleHelp (CVE-2024-57728)</div><div>&nbsp; SimpleHelp (CVE-2024-57726)</div><div>1 × WebPros :</div><div>&nbsp; cPanel &amp; WHM and WP2 (WordPress Squared) (CVE-2026-41940)</div><div>1 × ConnectWise :</div><div>&nbsp; ScreenConnect (CVE-2024-1708)</div><div>1 × Marimo :</div><div>&nbsp; Marimo (CVE-2026-39987)</div><div>1 × Samsung :</div><div>&nbsp; MagicINFO 9 Server (CVE-2024-7399)</div><div>1 × D-Link :</div><div>&nbsp; DIR-823X (CVE-2025-29635)</div><div>1 × Kentico :</div><div>&nbsp; Kentico Xperience (CVE-2025-2749)</div><div>1 × Synacor :</div><div>&nbsp; Zimbra Collaboration Suite (ZCS) (CVE-2025-48700)</div><div>1 × Quest :</div><div>&nbsp; KACE Systems Management Appliance (SMA) (CVE-2025-32975)</div><div>1 × Apache :</div><div>&nbsp; ActiveMQ (CVE-2026-34197)</div><div>1 × Ivanti :</div><div>&nbsp; Endpoint Manager Mobile (EPMM) (CVE-2026-1340)</div><div>1 × TrueConf :</div><div>&nbsp; Client (CVE-2026-3502)</div><div><br/></div></div><div><div></div>
</div><p></p></div><p></p></div><p></p><p></p><p></p></div></div></div></div></div>
</div></div> ]]></content:encoded><pubDate>Tue, 05 May 2026 00:33:21 +0200</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S18]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s18</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/> ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><b></b></div>
</div></div><span><span><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><b></b></div>
</div></div><p><strong>Le secteur manufacturier, cible prioritaire d'une menace ransomware qui se concentre</strong><br/></p><p><span><span>Publié par Resilience (assureur cyber), ce rapport croise des données de sinistralité internes (mars 2021 – février 2026) corélées avec des sources sectorielles externes pour dresser un état des lieux de la cybersécurité dans l'industrie manufacturière. Le secteur est la cible la plus attaquée au monde pour la cinquième année consécutive : les incidents ransomware y ont bondi de 61 % en 2025. Sur le portefeuille analysé, le ransomware représente 90 % des pertes totales, alors qu'il ne constitue que 12 % du volume de sinistres. Le principal facteur de perte n'est pas l'absence de protection, mais sa mauvaise configuration : les défauts de paramétrage du MFA (authentification multifacteur) sont responsables de 26 % des pertes, soit davantage que l'absence totale de MFA (8 %). La convergence IT/OT, l'ancienneté des systèmes industriels et la sous-dotation chronique des budgets sécurité constituent les vulnérabilités structurelles sous-jacentes.</span><br/></span></p><p><span><span><a href="https://4526209.fs1.hubspotusercontent-na1.net/hubfs/4526209/Manufacturing%20Report.pdf">https://4526209.fs1.hubspotusercontent-na1.net/hubfs/4526209/Manufacturing%20Report.pdf</a><br/></span></span></p><p><span><br/></span></p><p><strong>RDP/VNC exposés sur internet : l'accès distant, angle mort de la sécurité des systèmes cyber-physiques</strong><br/></p><p><span><span><span>Les chercheurs du Vedere Labs de Forescout recensent plus de 1,8 million de serveurs RDP et 1,6 million de serveurs VNC exposés sur internet, dont 18 % des serveurs RDP tournent sur des versions Windows en fin de vie, et plus de 19 000 restent vulnérables à la faille BlueKeep (CVE-2019-0708). Près de 60 000 serveurs VNC n'ont aucune authentification activée, dont 670 donnent un accès direct à des panneaux de contrôle OT/ICS. Sur le plan des acteurs de la menace cyber, des groupes tels que&nbsp; <span>Cyber Army of Russia Reborn (CARR), NoName057(16), Z-Pentest (composé de plusieurs groupes d'hacktivistes et Sector16)&nbsp;</span>utilisent des outils de scan ciblant spécifiquement RDP, VNC et les protocoles OT, tandis que le botnet Redheberg a infecté près de 40 000 serveurs VNC exposés depuis février.</span><br/></span></span></p><p><span><a href="https://www.forescout.com/blog/rdp-security-cps-threats-spark-need-for-secure-remote-access/">https://www.forescout.com/blog/rdp-security-cps-threats-spark-need-for-secure-remote-access/</a></span></p><p><br/></p><p><strong>Adapter le Zero Trust aux environnements OT : contraintes spécifiques et recommandations pratiques</strong></p><p><span><span>Ce guide interagences (CISA, DOE, FBI) pose un constat fondamental : le Zero Trust (ZT) ne peut être transposé tel quel des environnements IT vers l'OT, en raison des exigences de disponibilité continue, des systèmes legacy non patchables et des capacités de journalisation souvent inexistantes. Structuré selon le cadre NIST CSF 2.0 (Gouverner, Identifier, Protéger, Détecter, Répondre, Récupérer), il détaille des mesures concrètes : segmentation réseau et microsegmentation, gestion des identités et accès adaptée aux protocoles propriétaires OT, sécurisation des accès distants via jump hosts avec MFA, et surveillance passive pour ne pas perturber les systèmes. Un point saillant : l'IT et l'OT ne doivent pas partager de domaines ou annuaires Active Directory, leur convergence étant précisément le vecteur exploité par des acteurs comme Volt Typhoon pour pivoter vers les réseaux industriels.</span><br/></span></p><p><a href="https://www.cisa.gov/sites/default/files/2026-04/joint-guide-adapting-zero-trust-principles-to-operational-technology_508c.pdf">https://www.cisa.gov/sites/default/files/2026-04/joint-guide-adapting-zero-trust-principles-to-operational-technology_508c.pdf</a><br/></p><p><br/></p><p><span><span style="font-weight:bold;">Cyber-Process Hazard Analysis (PHA) par KPMG comme méthode structurée pour bâtir la résilience des systèmes industriels&nbsp;</span></span><br/></p><p><span><span><span>Face à une menace ransomware qui a quintuplé sur les réseaux industriels entre 2018 et 2020, le secteur industriel reste largement sous-préparé, malgré une prise de conscience croissante des dirigeants. Le document distingue la cyber-résilience de la cybersécurité classique : là où la seconde vise à bloquer les attaques, la première garantit la continuité des fonctions critiques même après compromission. La méthode porposé par la cabinet KPMG désignée par cyber-PHA (Process Hazard Analysis), est une transposition au domaine cyber d'une démarche d'analyse de risques industriels en six phases, de la définition du périmètre jusqu'au plan de remédiation priorisé. Cette approche est particulièrement adaptée aux environnements IT/OT convergents, où les vulnérabilités de PLCs, HMIs et systèmes SCADA peuvent entraîner des conséquences physiques réelles. L'étude de cas illustre son déploiement concret dans une organisation multi-sites sans référentiel de sécurité unifié, aboutissant à une architecture réseau segmentée et un programme cyber standardisé sur le périmètre industriel.</span><br/></span></span></p><p><span><span><span>Une méthode qui rapelle la démarche de classification des actifs industriels publiées par l'ANSSI.</span></span></span></p><p><a href="https://assets.kpmg.com/content/dam/kpmgsites/my/pdf/2022/08/pathway_to_industrial_cyber_resilience.pdf.coredownload.inline.pdf">https://assets.kpmg.com/content/dam/kpmgsites/my/pdf/2022/08/pathway_to_industrial_cyber_resilience.pdf.coredownload.inline.pdf</a><br/></p><p><br/></p><p><span style="font-size:20px;"><strong>Sur le volet offreurs de solutions (nouvelle section)</strong></span><br/></p><p><strong>Sennin, la plateforme de TXOne pour transformer l'évaluation des risques OT en protection opérationnelle concrète</strong><br/></p><p><span><span><span>TXOne Networks a lancé la famille de produits Sennin, une suite d'outils d'évaluation et d'orchestration conçue pour combler le fossé récurant entre l'identification des risques OT et leur traitement effectif. SenninRecon est un capteur réseau passif qui surveille plus de 180 protocoles industriels et produit une vue des risques priorisée selon la méthodologie VSAR de TXOne, intégrant exploitabilité réelle et contexte opérationnel ; SenninOne est la plateforme de gouvernance d'entreprise qui traduit ces résultats en politiques de sécurité actionnables, liées aux produits de protection réseau, endpoint et inspection de TXOne. L'enjeu central est structurel : la plupart des organisations savent déjà identifier leurs risques industriels, mais peinent à les corriger sans interrompre la production, Sennin est précisément conçu pour rendre cette transition opérationnellement acceptable</span><br/></span></span></p><p><span><span><span><a href="https://www.txone.com/news/sennin-ot-strategic-governance/">https://www.txone.com/news/sennin-ot-strategic-governance/</a><br/></span></span></span></p><p><span><span><span><br/></span></span></span></p><p><strong>Tenable intègre nativement la découverte OT à sa plateforme d'exposition pour unifier la visibilité IT/OT sans déploiement matériel</strong><br/></p><p><span><span><span><span>Tenable a lancé un moteur de découverte d'actifs OT intégré directement à sa plateforme Tenable One, sans matériel spécialisé ni agent supplémentaire requis, permettant aux équipes de sécurité d'obtenir immédiatement une visibilité sur les systèmes cyber-physiques, OT, IoT et shadow IT. Les premiers clients en accès anticipé, dans des secteurs aussi variés que l'hôtellerie, la finance ou l'éducation, ont découvert entre 100 et 1 000 actifs OT/IoT inconnus dès le premier déploiement, certains présentant des vulnérabilités critiques. L'enjeu est direct : 45 % des compromissions OT modernes trouvent leur origine dans des environnements IT, et cette nouvelle capacité permet de consolider en une vue unifiée l'exposition cyber-physique aux côtés des domaines cloud, identité et IA.</span><br/></span></span></span></p><p><span><span><span><a href="https://www.tenable.com/press-releases/tenable-expands-exposure-management-with-instant-ot-discovery-to-secure-cyber-physical-systems">https://www.tenable.com/press-releases/tenable-expands-exposure-management-with-instant-ot-discovery-to-secure-cyber-physical-systems</a></span></span></span></p><p></p><div><p><span style="font-weight:bold;"><span><br/></span></span></p><p><span style="font-weight:bold;font-size:20px;">Vulnerability&nbsp;Corner :</span>&nbsp;</p></div>
<div><p><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div>
<p></p><table border="1"><tbody><tr><td style="vertical-align:top;width:169px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:161.078px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:386.938px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:599.062px;"><div><p><strong>Liens&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:169px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1708" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CVE-2024-1708</span></a>&nbsp;</p></div></td><td style="vertical-align:top;width:161.078px;"><div><p>ConnectWise&nbsp;</p></div></td><td style="vertical-align:top;width:386.938px;"><div><p>ScreenConnect&nbsp;</p></div></td><td style="vertical-align:top;width:599.062px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1708%2C%20https%3A//www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">https://nvd.nist.gov/vuln/detail/CVE-2024-1708, https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8</span></a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:169px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32202" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CVE-2026-32202</span></a>&nbsp;</p></div></td><td style="vertical-align:top;width:161.078px;"><div><p>Microsoft&nbsp;</p></div></td><td style="vertical-align:top;width:386.938px;"><div><p>Windows&nbsp;</p></div></td><td style="vertical-align:top;width:599.062px;"><div><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-32202%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-32202" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-32202, https://nvd.nist.gov/vuln/detail/CVE-2026-32202</span></a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:169px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-41940" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CVE-2026-41940</span></a>&nbsp;</p></div></td><td style="vertical-align:top;width:161.078px;"><div><p>WebPros&nbsp;</p></div></td><td style="vertical-align:top;width:386.938px;"><div><p>cPanel &amp; WHM and WP2 (WordPress Squared)&nbsp;</p></div></td><td style="vertical-align:top;width:599.062px;"><div><p><a href="https://docs.cpanel.net/release-notes/release-notes/%2C%20https%3A//docs.wpsquared.com/changelogs/versions/changelog/#13617%2C%20https://nvd.nist.gov/vuln/detail/CVE-2026-41940" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">https://docs.cpanel.net/release-notes/release-notes/, https://docs.wpsquared.com/changelogs/versions/changelog/#13617, https://nvd.nist.gov/vuln/detail/CVE-2026-41940&quot;, https://support.cpanel.net/hc/en-us/articles/40073787579671-cPanel-WHM-Security-Update-04-28-2026</span></a>&nbsp;</p></div></td></tr></tbody></table><div></div>
<p></p><div><p><span>&nbsp;</span></p></div><div><p><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div>
<div><p><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div>
<p></p></span></span><table border="1"><tbody><tr><td style="vertical-align:top;width:82px;"><div><p><strong>Ven</strong><strong>dor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Critical&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>High&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Medium&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Low&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Total&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>ABB&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>7&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>3&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>11&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>NSA&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr></tbody></table><span><span><div></div>
<p></p><div><p><span>&nbsp;</span></p></div><div><p><span>&nbsp;</span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</p></div>
<p></p><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><p>V<strong>endor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVSSv3 Score&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVSSv3 Severity&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>EPSS&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CWE&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>ABB&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>ABB&nbsp;Edgenius&nbsp;Management Portal&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><span style="text-decoration:underline;">CVE-2025-10571</span>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.6&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/288.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CWE-288</span></a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>ABB&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>ABB Ability Symphony Plus Engineering&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><span style="text-decoration:underline;">CVE-2023-5869</span>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><div><p>8.8&nbsp;</p></div>
<div><p>&nbsp;</p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p>HIGH&nbsp;</p></div>
<div><p>&nbsp;</p></div></div></td><td style="vertical-align:top;width:72px;"><div><p>0.1%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/190.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CWE-190</span></a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>ABB&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>ABB Ability Symphony Plus Engineering&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><span style="text-decoration:underline;">CVE-2024-7348</span>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><div><p>HIGH&nbsp;</p></div>
<div><p>&nbsp;</p></div></div></td><td style="vertical-align:top;width:72px;"><div><p>73%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/367.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CWE-367</span></a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>ABB&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>ABB AWIN Gateways&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://www.cve.org/CVERecord?id=CVE-2025-13779" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CVE-2025-13779</span></a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CWE-306</span></a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>ABB&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>ABB Ability OPTIMAX&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://www.cve.org/CVERecord?id=CVE-2025-14510" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CVE-2025-14510</span></a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.1&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/303.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CWE-303</span></a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p>ABB&nbsp;</p></div>
<div><p>&nbsp;</p></div></div></td><td style="vertical-align:top;width:72px;"><div><p>ABB AWIN Gateways&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://www.cve.org/CVERecord?id=CVE-2025-13777" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CVE-2025-13777</span></a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><div><p>HIGH&nbsp;</p></div>
<div><p>&nbsp;</p></div></div></td><td style="vertical-align:top;width:72px;"><div><p>8%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/294.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CWE-294</span></a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>ABB&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>ABB Ability Symphony Plus Engineering&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><span style="text-decoration:underline;">CVE-2024-0985</span>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><div><p>8&nbsp;</p></div>
<div><p><span style="text-decoration:underline;"></span>&nbsp;</p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p>HIGH&nbsp;</p></div>
<div><p>&nbsp;</p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p>73%&nbsp;</p></div>
<div><p>&nbsp;</p></div></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/271.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CWE-271</span></a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>ABB&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>ABB Ability Symphony Plus Engineering&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://www.cve.org/CVERecord?id=CVE-2023-39417" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CVE-2023-39417</span></a><span style="text-decoration:underline;"></span>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.6%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/89.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CWE-89</span></a><span style="text-decoration:underline;"></span>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p>ABB&nbsp;</p></div>
<div><p>&nbsp;</p></div></div></td><td style="vertical-align:top;width:72px;"><div><p>ABB System 800xA, Symphony Plus IEC 61850&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><span style="text-decoration:underline;">CVE-</span><a href="https://www.cve.org/CVERecord?id=CVE-2025-3756" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">2025</span></a><span style="text-decoration:underline;">-3756</span>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/1284.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CWE-1284</span></a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>ABB&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>ABB AWIN Gateways&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><span style="text-decoration:underline;">CVE-2025-13778</span>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CWE-306</span></a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>NSA&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>GRASSMARLIN&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-6807" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CVE-2026-6807</span></a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>5.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.5%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/611.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CWE-611</span></a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>ABB&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>PCM600&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://www.cve.org/CVERecord?id=CVE-2018-1002208" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CVE-2018-1002208</span></a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>4.4&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.6%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/22.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CWE-22</span></a>&nbsp;</p></div></td></tr></tbody></table><div><div></div>
<div><p><span>&nbsp;</span></p></div><div><p>-----&nbsp;<br/><span style="font-weight:bold;font-size:20px;">Actualité Fortress Cybersecurity&nbsp;</span><br/></p></div>
<div><p><span><span><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-mars-2027" target="_blank" rel="">- Bilan des Known Exploited Vulnerabilities du mois de mars 202</a><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-mars-2027" target="_blank" rel="">6</a>&nbsp;</span><br/></span></p></div>
<div><p><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div>
<div><p><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div>
<div><p><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
</div><p><br/></p><p><span><span><br/></span></span></p></span></span></div></div>
</div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 03 May 2026 19:34:54 +0200</pubDate></item><item><title><![CDATA[Bilan des Known Exploited Vulnerabilities du mois de mars 2027]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-mars-2027</link><description><![CDATA[ ⚠️&nbsp; En mars 2026, l’agence de cybersécurité américaine (CISA) a ajouté 26 vulnérabilités, identifiées comme activement exploitées dans le cadre ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_oDkejEquSTCm9QqUenH7tg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_SIKykFb_TsWa-AUxhhWfNw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_QFmKC9SjRNSAyKRyxg67gg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_7SNFdUZukMdrsRG_8B6vOg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><p></p><p><span><span></span></span></p><p><span><span></span></span></p><p></p><div><p></p><div><p></p><div><div> ⚠️&nbsp; En mars 2026, l’agence de cybersécurité américaine (CISA) a ajouté 26 vulnérabilités, identifiées comme activement exploitées dans le cadre de cyberattaques, dans sa liste des Known Exploited Vulnerabilities (KEV), le nombre de KEV est en baisse (-2) par rapport au mois précédent. </div><div><br/></div><div><div><p>La tendance générale sur les 12 derniers mois est en légère baisse.</p><p><br/></p></div></div><span><img src="/Tue%20Apr%2007%202026.png" alt=""/></span><div><br/></div>
<div> 🎆 L'objectif de cette liste est de permettre aux organisations de prioriser leurs actions de patching. Afin de se rendre compte de l'importance des nouvelles entrées dans cette liste : toutes les agences de l’administration américaine doivent corriger ces vulnérabilités dans les 21 jours qui suivent l'ajout dans la liste ! </div>
<div><br/></div><div> ☣️&nbsp; KEV exploitées par un ransomware : </div><div> 1 x Cisco : </div>
<div> &nbsp; Secure Firewall Management Center (FMC) (CVE-2026-20131) </div></div>
<div><br/></div><div><div> 🔥 Liste des autres KEV : </div><div> 6 × Apple : </div>
<div> &nbsp; Multiple Products (CVE-2025-43510) </div><div> &nbsp; Multiple Products (CVE-2025-43520) </div>
<div> &nbsp; Multiple Products (CVE-2025-31277) </div><div> &nbsp; Multiple Products (CVE-2023-43000) </div>
<div> &nbsp; Multiple Products (CVE-2021-30952) </div><div> &nbsp; iOS and iPadOS (CVE-2023-41974) </div>
<br/><div> 2 × Google : </div><div> &nbsp; Chromium V8 (CVE-2026-3910) </div><div> &nbsp; Skia (CVE-2026-3909) </div>
<br/><div> 1 × Citrix : </div><div> &nbsp; NetScaler (CVE-2026-3055) </div><br/><div> 1 × F5 : </div>
<div> &nbsp; BIG-IP (CVE-2025-53521) </div><br/><div> 1 × Langflow : </div><div> &nbsp; Langflow (CVE-2026-33017) </div>
<br/><div> 1 × Aquasecurity : </div><div> &nbsp; Trivy (CVE-2026-33634) </div><br/><div> 1 × Laravel : </div>
<div> &nbsp; Livewire (CVE-2025-54068) </div><br/><div> 1 × Craft CMS : </div><div> &nbsp; Craft CMS (CVE-2025-32432) </div>
<br/><div> 1 × Synacor : </div><div> &nbsp; Zimbra Collaboration Suite (ZCS) (CVE-2025-66376) </div>
<br/><div> 1 × Microsoft : </div><div> &nbsp; SharePoint (CVE-2026-20963) </div><br/><div> 1 × Wing FTP Server : </div>
<div> &nbsp; Wing FTP Server (CVE-2025-47813) </div><br/><div> 1 × n8n : </div><div> &nbsp; n8n (CVE-2025-68613) </div>
<br/><div> 1 × Omnissa : </div><div> &nbsp; Workspace One UEM (CVE-2021-22054) </div>
<br/><div> 1 × SolarWinds : </div><div> &nbsp; Web Help Desk (CVE-2025-26399) </div>
<br/><div> 1 × Ivanti : </div><div> &nbsp; &nbsp;Endpoint Manager (EPM) (CVE-2026-1603) </div>
<br/><div> 1 × Hikvision : </div><div> &nbsp; Multiple Products (CVE-2017-7921) </div>
<br/><div> 1 × Rockwell : </div><div> &nbsp; Multiple Products (CVE-2021-22681) </div>
<br/><div> 1 × Broadcom : </div><div> &nbsp; VMware Aria Operations (CVE-2026-22719) </div>
<br/><div> 1 × Qualcomm : </div><div> &nbsp; Multiple Chipsets (CVE-2026-21385) </div>
</div><p></p></div><p></p></div><p></p><p></p><p></p></div></div></div></div></div>
</div></div> ]]></content:encoded><pubDate>Tue, 07 Apr 2026 07:39:26 +0200</pubDate></item><item><title><![CDATA[Bilan des Known Exploited Vulnerabilities du mois de janvier 2026]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-janvier-2026</link><description><![CDATA[? Bilan des Known Exploited Vulnerabilities du mois de janvier 2026 ⚠️&nbsp; En janvier 2026, l’agence de cybersécurité américaine (CISA) a ajouté 17 ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_oDkejEquSTCm9QqUenH7tg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_SIKykFb_TsWa-AUxhhWfNw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_QFmKC9SjRNSAyKRyxg67gg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_7SNFdUZukMdrsRG_8B6vOg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><p></p><p><span><span></span></span></p><p><span><span></span></span></p><p></p><div><p></p><div><div>💥 Bilan des Known Exploited Vulnerabilities du mois de janvier 2026</div><div><br/></div><div>⚠️&nbsp; En janvier 2026, l’agence de cybersécurité américaine (CISA) a ajouté 17 vulnérabilités, identifiées comme activement exploitées dans le cadre de cyberattaques, dans sa liste des Known Exploited Vulnerabilities (KEV), le nombre de KEV est en hausse (-3) par rapport au mois précédent.</div><div><br/></div><div>La tendance générale sur les 12 derniers mois est en légère augmentation du fait du pic exceptionnel du mois dernier.</div><div>À date, 1507 KEV sont référencées.</div><div>🎆 L'objectif de cette liste est de permettre aux organisations de prioriser leurs actions de patching. Afin de se rendre compte de l'importance des nouvelles entrées dans cette liste : toutes les agences de l’administration américaine doivent corriger ces vulnérabilités dans les 21 jours qui suivent l'ajout dans la liste !</div><div>☣️&nbsp; KEV exploitées par un ransomware : aucune</div><div><br/></div><div><span><img src="/Sun%20Feb%2008%202026.png" alt=""/></span><br/></div><div><br/></div><div>🔥 Liste des autres KEV :</div><div>3 × Microsoft :</div><div>&nbsp; Office (CVE-2026-21509)</div><div>&nbsp; Windows (CVE-2026-20805)</div><div>&nbsp; Office (CVE-2009-0556)</div><div>2 × SmarterTools :</div><div>&nbsp; SmarterMail (CVE-2025-52691)</div><div>&nbsp; SmarterMail (CVE-2026-23760)</div><div>1 × Fortinet :</div><div>&nbsp; Multiple Products (CVE-2026-24858)</div><div>1 × Ivanti :</div><div>&nbsp; Endpoint Manager Mobile (EPMM) (CVE-2026-1281)</div><div>1 × Linux :</div><div>&nbsp; Kernal (CVE-2018-14634)</div><div>1 × GNU :</div><div>&nbsp; InetUtils (CVE-2026-24061)</div><div>1 × Broadcom :</div><div>&nbsp; VMware vCenter Server (CVE-2024-37079)</div><div>1 × Synacor :</div><div>&nbsp; &nbsp;Zimbra Collaboration Suite (ZCS) (CVE-2025-68645)</div><div>1 × Versa :</div><div>&nbsp; Concerto (CVE-2025-34026)</div><div>1 × Vite :</div><div>&nbsp; Vitejs (CVE-2025-31125)</div><div>1 × Prettier :</div><div>&nbsp; eslint-config-prettier (CVE-2025-54313)</div><div>1 × Cisco :</div><div>&nbsp; Unified Communications Manager (CVE-2026-20045)</div><div>1 × Gogs :</div><div>&nbsp; Gogs (CVE-2025-8110)</div><div>1 × Hewlett Packard Enterprise (HPE) :</div><div>&nbsp; OneView (CVE-2025-37164)</div><br/><div><br/></div></div><br/><br/><p></p></div><p></p><p></p><p></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 08 Feb 2026 19:22:27 +0100</pubDate></item><item><title><![CDATA[Bilan des Known Exploited Vulnerabilities du mois de décembre 2025]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-décembre-2025</link><description><![CDATA[⚠️&nbsp; En December 2025, l’agence de cybersécurité américaine (CISA) a ajouté 20 vulnérabilités, identifiées comme activement exploitées dans le cad ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_oDkejEquSTCm9QqUenH7tg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_SIKykFb_TsWa-AUxhhWfNw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_QFmKC9SjRNSAyKRyxg67gg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_7SNFdUZukMdrsRG_8B6vOg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><p></p><p><span><span></span></span></p><p><span><span></span></span></p><p></p><div><div>⚠️&nbsp; En December 2025, l’agence de cybersécurité américaine (CISA) a ajouté 20 vulnérabilités, identifiées comme activement exploitées dans le cadre de cyberattaques, dans sa liste des Known Exploited Vulnerabilities (KEV), le nombre de KEV est en hausse (9) par rapport au mois précédent.</div><div><br/></div><div>☣️&nbsp; 1 x KEV exploitées par un ransomware sur les produits des éditeurs suivants :&nbsp;<span>Meta.</span></div><br/><div>🔥 Editeurs concernés par les KEV : ASUS, Android, Apple, Array Networks , Cisco, D-Link, Digiever, Fortinet, Gladinet, Google, Meta, Microsoft, MongoDB, OSGeo, OpenPLC, RARLAB, Sierra Wireless, SonicWall, WatchGuard.</div><div><br/></div><div><span>À date, 1494 KEV sont référencées.</span><br/></div><div><br/></div><div><div><strong>La tendance générale sur les 12 derniers mois est en légére baisse :</strong></div></div><div><span><img src="/Mon%20Jan%2026%202026.png" alt=""/></span><br/></div><div><br/></div><div>🎆 L'objectif de cette liste est de permettre aux organisations de prioriser leurs actions de patching. Afin de se rendre compte de l'importance des nouvelles entrées dans cette liste : toutes les agences de l’administration américaine doivent corriger ces vulnérabilités dans les 21 jours qui suivent l'ajout dans la liste !</div><div><br/></div><div>☣️&nbsp; KEV exploitées par un ransomware :</div><div>1 x Meta : React Server Components (CVE-2025-55182)</div><div>🔥 Liste des autres KEV :</div><div>2 × Android :</div><div>&nbsp; Framework (CVE-2025-48633)</div><div>&nbsp; Framework (CVE-2025-48572)</div><div>1 × Digiever :</div><div>&nbsp; DS-2105 Pro (CVE-2023-52163)</div><div>1 × MongoDB :</div><div>&nbsp; MongoDB and MongoDB Server (CVE-2025-14847)</div><div>1 × WatchGuard :</div><div>&nbsp; Firebox (CVE-2025-14733)</div><div>1 × ASUS :</div><div>&nbsp; Live Update (CVE-2025-59374)</div><div>1 × Cisco :</div><div>&nbsp; Multiple Products (CVE-2025-20393)</div><div>1 × SonicWall :</div><div>&nbsp; SMA1000 appliance (CVE-2025-40602)</div><div>1 × Gladinet :</div><div>&nbsp; CentreStack and Triofox (CVE-2025-14611)</div><div>1 × Apple :</div><div>&nbsp; Multiple Products (CVE-2025-43529)</div><div>1 × Sierra Wireless :</div><div>&nbsp; AirLink ALEOS (CVE-2018-4063)</div><div>1 × Fortinet :</div><div>&nbsp; Multiple Products (CVE-2025-59718)</div><div>1 × Google :</div><div>&nbsp; Chromium (CVE-2025-14174)</div><div>1 × OSGeo :</div><div>&nbsp; GeoServer (CVE-2025-58360)</div><div>1 × Microsoft :</div><div>&nbsp; Windows (CVE-2025-62221)</div><div>1 × RARLAB :</div><div>&nbsp; WinRAR (CVE-2025-6218)</div><div>1 × D-Link :</div><div>&nbsp; Routers (CVE-2022-37055)</div><div>1 × Array Networks&nbsp; :</div><div>&nbsp; ArrayOS AG (CVE-2025-66644)</div><div>1 × OpenPLC :</div><div>&nbsp; ScadaBR (CVE-2021-26828)</div><br/><div><br/></div></div><br/><p></p><p></p><p></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 26 Jan 2026 08:16:38 +0100</pubDate></item><item><title><![CDATA[Bilan des Known Exploited Vulnerabilities du mois de novembre 2025]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-novembre-2025</link><description><![CDATA[⚠️ En novembre 2025, l’agence de cybersécurité américaine (CISA) a ajouté 11 vulnérabilités , identifiées comme activement exploitées dans la cadre de ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_oDkejEquSTCm9QqUenH7tg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_SIKykFb_TsWa-AUxhhWfNw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_QFmKC9SjRNSAyKRyxg67gg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_7SNFdUZukMdrsRG_8B6vOg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><p></p><p><span><span></span></span></p><p><span><span></span></span></p><p>⚠️ En novembre 2025, l’agence de cybersécurité américaine (CISA) a ajouté <span style="font-weight:700;">11 vulnérabilités</span>, identifiées comme activement exploitées dans la cadre de cyberattaques, dans sa liste des Known Exploited Vulnerabilities (KEV), le nombre de KEV est en baisse <span style="font-weight:700;">(-20) </span>par rapport au mois précédent.</p><br/><p><span>☣️ 0 x KEV exploitées par un ransomware sur les produits des éditeurs suivants.</span></p><p><span>🔥 Editeurs concernés par les KEV : CWP, Fortinet, Gladinet, Google, Microsoft, OpenPLC, Oracle, Samsung, WatchGuard</span></p><br/><p><span style="font-weight:700;">La tendance générale sur les 12 derniers mois est stable.</span></p><div><span><img src="/Thu%20Dec%2004%202025.png" alt=""/></span><br/></div><br/><p><span>À date, 1464 KEV sont référencées.</span></p><p><br/></p><p><span>🎆 L'objectif de cette liste est de permettre aux organisations de prioriser leurs actions de patching. Afin de se rendre compte de l'importance des nouvelles entrées dans cette liste : toutes les agences de l’administration américaine doivent corriger ces vulnérabilités dans les 21 jours qui suivent l'ajout dans la liste !</span></p><br/><p><span>☣️ KEV exploitées par un ransomware : Aucune</span></p><br/><p><span>🔥 Liste des autres KEV :</span></p><p><span>2 x Gladinet :</span></p><p><span>&nbsp; &nbsp; &nbsp;</span>CentreStack and Triofox CVE-2025-11371</p><p><span>&nbsp; &nbsp; &nbsp;</span>Triofox CVE-2025-12480</p><p><span>2 x Fortinet :</span></p><p><span>&nbsp; &nbsp; &nbsp;</span>FortiWeb CVE-2025-58034, CVE-2025-64446</p><p><span>1 x WatchGuard :</span></p><p><span>&nbsp; &nbsp; &nbsp;</span>Firebox CVE-2025-9242</p><p><span>1 x Samsung :</span></p><p><span>&nbsp; &nbsp; &nbsp;</span>Mobile Devices CVE-2025-21042</p><p><span>1 x Oracle&nbsp;</span>:</p><p><span>&nbsp; &nbsp; &nbsp;</span>Fusion Middleware CVE-2025-61757</p><p><span>1 x OpenPLC:&nbsp;</span></p><p><span>&nbsp; &nbsp; &nbsp;</span>ScadaBR CVE-2021-26829</p><p><span>1 x Microsoft :</span></p><p><span>&nbsp; &nbsp; &nbsp;</span>Windows CVE-2025-62215</p><p><span>1 x Google :</span></p><p><span>&nbsp; &nbsp; &nbsp;</span>Chromium V8 CVE-2025-13223</p><p><span>1 x CWP :</span></p><p>&nbsp; &nbsp; &nbsp;Control Web Panel CVE-2025-48703</p><p></p><p></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 04 Dec 2025 21:31:52 +0100</pubDate></item><item><title><![CDATA[Calendrier 2026 de nos webinaires dédiés à la cybersécurité des installations industrielles]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-dédiés-à-la-cybersécurité-des-installations-industrielles</link><description><![CDATA[Nous vous proposons une session d'une heure à partir de 9h30... et restons à disposition pour des sessions &quot;privées&quot;. 8 janvier 2026 : Défini ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_PgoIeHDYR2OYkjvVqtqWZw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_2vU-65yOTKShxUOgobGjLQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_n86lYD5zTQ2rxE3-1RUZoA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_n86lYD5zTQ2rxE3-1RUZoA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_oQVgNWl6R8ufcOwfx-7zlA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oQVgNWl6R8ufcOwfx-7zlA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p style="text-align:left;color:inherit;margin-bottom:12pt;">Nous vous proposons une session d'une heure à partir de 9h30... et restons à disposition pour des sessions &quot;privées&quot;.</p><p style="text-align:left;margin-bottom:12pt;"><font style="font-weight:bold;">8 janvier 2026 : </font>Définir sa stratégie de détection en environnement industriel​,&nbsp;<span style="color:inherit;text-align:center;">inscription</span>&nbsp;<span style="font-weight:bold;"><a href="https://events.teams.microsoft.com/event/591f0891-1fda-4029-9812-497ae82c48ff%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" title="lien" target="_blank" rel="">lien</a>&nbsp;</span></p><p style="text-align:left;margin-bottom:12pt;"><span style="font-weight:bold;">6 février 2026 :&nbsp;</span><span style="color:inherit;"></span>Construire le plan de protection de ses installations industrielles, <span><span>inscription</span></span>​<span style="color:inherit;text-align:center;"></span><span style="font-weight:bold;">&nbsp;<a href="https://events.teams.microsoft.com/event/ff70c30b-3a81-44d5-a118-8541407e5699%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" title="lien" target="_blank" rel="">lien</a></span></p><p style="text-align:left;margin-bottom:12pt;"><span style="font-weight:bold;">5 mars 2026 :&nbsp;</span><span style="color:inherit;">​Sécuriser les échanges de fichiers entre les zones industrielles et IT,&nbsp;inscription</span><span style="color:inherit;text-align:center;">&nbsp;</span><span style="font-weight:bold;"><a href="https://events.teams.microsoft.com/event/7abb2065-6cf1-41bd-956a-9eaaf4655853%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" title="lien" rel="">lien</a></span></p><p style="text-align:left;margin-bottom:12pt;"><span style="font-weight:bold;color:inherit;">9 avril 2026 : </span><span style="color:inherit;">NIS 2 pour l’industrie​,&nbsp;inscription</span><span style="color:inherit;text-align:center;">&nbsp;</span><span style="font-weight:bold;"><a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" title="&nbsp;lien" rel="">lien</a></span></p><p style="text-align:left;margin-bottom:12pt;"><span style="font-weight:bold;color:inherit;">7 mai 2026 : </span><span style="color:inherit;">Segmenter les réseaux industriels​,</span><span style="font-weight:bold;color:inherit;">&nbsp;</span><span style="color:inherit;text-align:center;">inscription</span><span style="color:inherit;text-align:center;">&nbsp;</span><span style="font-weight:bold;"><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" title="lien" target="_blank" rel="">lien</a></span></p><p style="text-align:left;margin-bottom:12pt;"><span style="font-weight:bold;color:inherit;">4 juin 2026 : </span><span style="color:inherit;">Gérer les incidents cyber en environnement industriel​,</span><span style="font-weight:bold;color:inherit;">&nbsp;</span><span style="color:inherit;text-align:center;">inscription</span><span style="color:inherit;text-align:center;">&nbsp;</span><span style="font-weight:bold;"><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" title="lien" target="_blank" rel="">lien</a></span></p><p style="text-align:left;margin-bottom:12pt;"></p><p style="text-align:left;margin-bottom:12pt;"><strong>2 juillet 2026 :</strong> Gérer les vulnérabilités en environnement industriel​​,<span style="font-weight:bold;">&nbsp;</span><span style="text-align:center;">inscription&nbsp;</span><strong><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" title="lien" target="_blank" rel="">lien</a></strong></p><p style="text-align:left;margin-bottom:12pt;"><span></span></p><p style="text-align:left;margin-bottom:12pt;"><strong>3 septembre 2026 :</strong>&nbsp;Mettre en place le plan de contrôle cyber de ses installations industriels​​,&nbsp;inscription <strong><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" title="lien" target="_blank" rel="">lien</a></strong></p><p style="text-align:left;margin-bottom:12pt;"><strong>1 octobre 2026 :</strong> Sécuriser les accès à distance et de télémaintenance des actifs industriels,&nbsp;inscription <strong><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" title="lien" target="_blank" rel="">lien</a></strong></p><p style="text-align:left;margin-bottom:12pt;"><strong>5 novembre 2026 :</strong>&nbsp; Protéger les endpoints dans les zones industrielles, inscription <strong><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" title="lien" target="_blank" rel="">lien</a></strong></p><p style="text-align:left;margin-bottom:12pt;"><strong>3 décembre 2026 :</strong><span style="font-weight:bold;">&nbsp;</span>Protéger les réseaux mobiles privés 5G,&nbsp;<span style="text-align:center;">inscription</span>&nbsp;<strong><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" title="lien&nbsp;" target="_blank" rel="">lien&nbsp;</a></strong></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 03 Dec 2025 09:39:37 +0100</pubDate></item><item><title><![CDATA[Bilan des Known Exploited Vulnerabilities du mois d'octobre 2025]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-d-octobre-2025</link><description><![CDATA[⚠️ En octobre 2025, l’agence de cybersécurité américaine (CISA) a ajouté 31 vulnérabilités , identifiées comme activement exploitées dans la cadre de c ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_oDkejEquSTCm9QqUenH7tg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_SIKykFb_TsWa-AUxhhWfNw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_QFmKC9SjRNSAyKRyxg67gg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_7SNFdUZukMdrsRG_8B6vOg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><p><span><span></span></span></p><p><span>⚠️ En octobre 2025, l’agence de cybersécurité américaine (CISA) a ajouté </span><span style="font-weight:700;">31 vulnérabilités</span><span>, identifiées comme activement exploitées dans la cadre de cyberattaques, dans sa liste des Known Exploited Vulnerabilities (KEV), le nombre de KEV est en </span><span style="font-weight:700;">hausse (+15) </span><span>par rapport au mois précédent.</span></p><br/><p><span>☣️ 0 x KEV exploitées par un ransomware.</span></p><p><span>🔥 Editeurs concernés par les KEV : Apple, Broadcom, Dassault Systèmes, GNU, Grafana Labs, IGEL, Jenkins, Juniper, Kentico, Linux, Microsoft, Motex, Mozilla, Samsung, SKYSEA, Smartbedded, Synacor, XWiki.</span></p><br/><p><span style="font-weight:700;">La tendance générale sur les 12 derniers mois est en légère augmentation du fait du pic exceptionnel du mois dernier.</span></p><span><img src="/Mon%20Nov%2017%202025.png" alt=""/></span><br/><p><span>À date, 1453 KEV sont référencées.</span></p><br/><p><span>🎆 L'objectif de cette liste est de permettre aux organisations de prioriser leurs actions de patching. Afin de se rendre compte de l'importance des nouvelles entrées dans cette liste : toutes les agences de l’administration américaine doivent corriger ces vulnérabilités dans les 21 jours qui suivent l'ajout dans la liste !</span></p><br/><p><span>☣️ KEV exploitées par un ransomware :</span></p><p><span>2 x Oracle :</span></p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;E-Business Suite (CVE-2025-61882, CVE-2025-61884)</p><br/><p><span>🔥 Liste des autres KEV :</span></p><p><span>8 × Microsoft :</span></p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Internet Explorer (CVE-2010-3962)</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Windows (CVE-2011-3402, CVE-2013-3918, CVE-2021-43226, CVE-2025-24990, CVE-2025-33073, CVE-2025-59230, CVE-2025-59287)</p><p><span>2 × Kentico :</span></p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Xperience CMS (CVE-2025-2746, CVE-2025-2747)</p><p><span>2 × Dassault Systèmes :</span></p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;DELMIA Apriso (CVE-2025-6204, CVE-2025-6205)</p><p><span>2 × Adobe :</span></p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Commerce and Magento (CVE-2025-54236)</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Experience Manager (AEM) Forms (CVE-2025-54253)</p><p><span>1 × XWiki :</span></p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Platform (CVE-2025-24893)</p><p><span>1 × Synacor</span></p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Zimbra Collaboration Suite (ZCS) (CVE-2025-27915)</p><p><span>1 × Smartbedded&nbsp;</span></p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Meteobridge (CVE-2025-4008)</p><p><span>1 × SKYSEA</span></p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Client View (CVE-2016-7836)</p><p><span>1 × Samsung</span></p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Mobile Devices (CVE-2025-21043)</p><p><span>1 × Mozilla</span></p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Multiple Products (CVE-2010-3765)</p><p><span>1 × Motex</span>&nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;LANSCOPE Endpoint Manager (CVE-2025-61932)</p><span><span><p><span>1 × Linux</span></p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Kernel (CVE-2021-22555)</p><p><span>1 × Juniper</span></p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ScreenOS (CVE-2015-7755)</p><p><span>1 × Jenkins</span></p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Jenkins (CVE-2017-1000353)</p><p><span>1 × IGEL</span></p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;IGEL OS (CVE-2025-47827)</p><p><span>1 × Grafana Labs</span></p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Grafana (CVE-2021-43798)</p><p><span>1 × GNU</span></p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;GNU Bash (CVE-2014-6278)</p><p><span>1 × Broadcom</span></p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;VMware Aria Operations and VMware Tools (CVE-2025-41244)</p><p><span>1 × Apple</span></p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Multiple Products (CVE-2022-48503)</p></span></span><p></p><p></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 17 Nov 2025 22:33:22 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 25.S37]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-25.s37</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Ports maritimes : une cible majeure des cyberattaques &nbsp; Les ports maritimes sont au cœur du commerce mondial et des opérations militaires de l’OTA ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div><div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;">Ports maritimes : une cible majeure des cyberattaques</span><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="color:rgb(35, 41, 55);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"><span>Les ports maritimes sont au cœur du commerce mondial et des opérations militaires de l’OTAN. Ils subissent de plus en plus de cyberattaques&nbsp;liées à la Russie, l’Iran ou la Chine, qui cherchent à perturber la logistique et à fragiliser les activités de l'OTAN. Avec la numérisation croissante des ports, les systèmes informatiques et industriels sont désormais très exposés : un seul incident peut avoir des effets en chaîne, comme l’a montré l’attaque </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">NotPetya</span><span> qui avait paralysé le transport maritime mondial. À côté de ces menaces étatiques, on trouve aussi des hacktivistes qui mènent des attaques par déni de </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">service (</span><span>DDOS). Les règles actuelles de l’OTAN et du secteur maritime sont encore trop centrées sur la sécurité physique et ne prennent pas assez en compte les menaces cyber.</span></span><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;color:rgb(35, 41, 55);">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="color:rgb(35, 41, 55);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span><a href="https://www.ccdcoe.org/uploads/2025/07/CCDCOE_Policy_Brief.pdf" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;text-decoration-line:underline;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"><span>https://www.ccdcoe.org/uploads/2025/07/CCDCOE_Policy_Brief.pdf</span></span></a><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;">Alerte : Cyber-espionnage UNC3886 à Singapour</span><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"><span>Le groupe chinois UNC3886 mène une campagne de cyber-espionnage sophistiquée contre les infrastructures critiques de Singapour. Actif depuis 2021, il exploite des failles </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">zero-day</span><span> (Fortinet, VMware, Juniper) et déploie des malwares sur mesure. Le groupe spécifiquement les secteurs de l’énergie, de l’eau, de la finance, des télécoms et les services gouvernementaux.</span></span></p><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><a href="https://www.otisac.org/_files/ugd/5f2206_13f269f3f5cf4ceca8d3429d6ea73e26.pdf" target="_blank" rel="noreferrer noopener" style="background-color:transparent;"><span style="color:rgb(0, 0, 255);font-size:12pt;text-decoration-line:underline;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">https://www.otisac.org/_files/ugd/5f2206_13f269f3f5cf4ceca8d3429d6ea73e26.pdf</span></a><span style="background-color:transparent;color:windowtext;font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">LockBit</span><span> 5.0 : le retour du groupe de rançongiciels</span></span><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">LockBit</span><span> était l'un des groupes de ransomware les plus redoutés, avec plus de 2700 victimes, soit trois fois plus que ses concurrents comme Akira et Play. En février 2024, une opération de police internationale a affaibli le groupe, des membres ont été arrêtés, leurs serveurs fermés et leurs comptes bloqués. Malgré cela, </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">LockBit</span><span> a annoncé son retour avec une nouvelle version </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">LockBit</span><span> 5.0. Cette version est plus rapide que </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">LockBit</span><span> 4.0 en chiffrant les données et dispose de meilleures capacités de contournement des dispositifs de protection.</span></span><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><a href="https://thecyberexpress.com/lockbit-5-0-ransomware/" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;text-decoration-line:underline;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"><span>https://thecyberexpress.com/lockbit-5-0-ransomware/</span></span></a><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;">Jaguar Land Rover a été ciblé par une cyberattaque</span><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"><span>La fabriquant d'automobiles Jaguar Land Rover (JLR), a été victime d'une cyberattaque qui a touché ses deux principales usines au Royaume-Uni. L'incident est arrivé à un moment important, juste avant que les clients reçoivent leurs voitures. Aucune donnée clients n'a été volée. </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Par contre</span><span>, la production et les ventes ont été perturbées. L'entreprise a vite réagi pour limiter les problèmes et relancer ses activités.</span></span><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><a href="https://www.bbc.com/news/articles/c9wywvllq7wo" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;text-decoration-line:underline;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"><span>https://www.bbc.com/news/articles/c9wywvllq7wo</span></span></a><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div><div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:14pt;line-height:25.3px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span>Vulnerability </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Corner :</span></span><span style="font-size:14pt;line-height:25.3px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Liste</span><span> des Known Exploited Vulnerabilities (KEV) </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">publiés</span><span> par </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">l'agence</span><span> de </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">cybersécurité</span><span> américaine CISA la </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">semaine&nbsp;</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">dernière</span><span> :&nbsp;</span></span><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><div style="margin-top:2px;margin-bottom:2px;overflow:visible;"><table border="1" style="table-layout:fixed;width:0px;empty-cells:show;overflow:visible;background:transparent;"><tbody><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;background-color:rgb(42, 86, 232);border:1px solid;width:144px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;color:white !important;"><strong>CVE</strong></span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;background-color:rgb(42, 86, 232);border:1px solid;width:144px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;color:white !important;"><strong>Vendor</strong></span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;background-color:rgb(42, 86, 232);border:1px solid;width:144px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;color:white !important;"><strong>Product</strong></span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;background-color:rgb(42, 86, 232);border:1px solid;width:144px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;color:white !important;"><strong>Liens</strong></span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:144px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-5086" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;text-decoration-line:underline;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">CVE-2025-5086</span></a><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:144px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">Dassault <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Systèmes</span></span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:144px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">DELMIA Apriso</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:144px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-5086%2C%20https%3A//www.3ds.com/trust-center/security/security-advisories/cve-2025-5086" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;text-decoration-line:underline;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">https://nvd.nist.gov/vuln/detail/CVE-2025-5086, https://www.3ds.com/trust-center/security/security-advisories/cve-2025-5086</span></a><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td></tr></tbody></table></div></div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:14pt;line-height:25.3px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Vulnérabilités</span><span> de </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">composants</span><span> de </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">systèmes </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">industriels</span><span> :&nbsp;</span></span><span style="font-size:14pt;line-height:25.3px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div><div><table border="1" style="table-layout:fixed;width:0px;empty-cells:show;overflow:visible;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;"><tbody><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;background-color:rgb(42, 86, 232);border:1px solid;width:82px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;color:white !important;"><strong>Vendor</strong></span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;background-color:rgb(42, 86, 232);border:1px solid;width:571.234px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;color:white !important;"><strong>Product</strong></span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;background-color:rgb(42, 86, 232);border:1px solid;width:51.7656px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;color:white !important;"><strong>Critical</strong></span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;background-color:rgb(42, 86, 232);border:1px solid;width:82px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;color:white !important;"><strong>High</strong></span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;background-color:rgb(42, 86, 232);border:1px solid;width:82px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;color:white !important;"><strong>Medium</strong></span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;background-color:rgb(42, 86, 232);border:1px solid;width:82px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;color:white !important;"><strong>Low</strong></span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;background-color:rgb(42, 86, 232);border:1px solid;width:82px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;color:white !important;"><strong>Total</strong></span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:82px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">Rockwell Automation</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:571.234px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">1783-<span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">NATR,Analytics</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">LogixAI,CompactLogix</span>® <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">5480,ControlLogix</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">5580,FactoryTalk</span> Activation <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Manager,FactoryTalk</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Optix,Stratix</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">IOS,ThinManager</span></span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:51.7656px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">1</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:82px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">6</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:82px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">1</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:82px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">0</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:82px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">8</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:82px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">ABB</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:571.234px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">ABB ASPECT-Enterprise ASP-ENT-x</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:51.7656px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">1</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:82px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">1</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:82px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">1</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:82px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">0</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:82px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">3</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td></tr></tbody></table></div><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;"><div><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;"><br/></span></span></span></div>Liste </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">complète </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">triée</span><span> par CVSSv3 </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Score :</span></span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></span><br/></div>
<div><div><table border="1" style="table-layout:fixed;width:0px;empty-cells:show;overflow:visible;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;"><tbody><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;background-color:rgb(42, 86, 232);border:1px solid;width:124px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;color:white !important;"><strong>Vendor</strong></span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;background-color:rgb(42, 86, 232);border:1px solid;width:357px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;color:white !important;"><strong>Product</strong></span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;background-color:rgb(42, 86, 232);border:1px solid;width:262.766px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;color:white !important;"><strong>CVE</strong></span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;background-color:rgb(42, 86, 232);border:1px solid;width:96.0156px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;color:white !important;"><strong>CVSSv3 Score</strong></span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;background-color:rgb(42, 86, 232);border:1px solid;width:122.016px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;color:white !important;"><strong>CVSSv3 Severity</strong></span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;background-color:rgb(42, 86, 232);border:1px solid;width:98.5625px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;color:white !important;"><strong>EPSS</strong></span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;background-color:rgb(42, 86, 232);border:1px solid;width:104.531px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;color:white !important;"><strong>Percentile</strong></span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;background-color:rgb(42, 86, 232);border:1px solid;width:120.469px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;color:white !important;"><strong>CWE</strong></span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:124px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">ABB</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:357px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">ABB ASPECT-Enterprise ASP-ENT-x</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:262.766px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-53187" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;text-decoration-line:underline;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">CVE-2025-53187</span></a><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:96.0156px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">9.8</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:122.016px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">CRITICAL</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:98.5625px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">0.070%</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:104.531px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">21.840%</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:120.469px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><a href="https://cwe.mitre.org/data/definitions/288.html" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;text-decoration-line:underline;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">CWE-288</span></a><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:124px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">Rockwell Automation</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:357px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">Stratix IOS</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:262.766px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-7350" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;text-decoration-line:underline;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">CVE-2025-7350</span></a><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:96.0156px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">9.6</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:122.016px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">CRITICAL</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:98.5625px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">0.357%</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:104.531px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">57.283%</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:120.469px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><a href="https://cwe.mitre.org/data/definitions/74.html" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;text-decoration-line:underline;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">CWE-74</span></a><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:124px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">Rockwell Automation</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:357px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">Analytics <span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">LogixAI</span></span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:262.766px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9364" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;text-decoration-line:underline;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">CVE-2025-9364</span></a><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:96.0156px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">8.8</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:122.016px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">HIGH</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:98.5625px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">0.006%</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:104.531px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">0.288%</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:120.469px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><a href="https://cwe.mitre.org/data/definitions/497.html" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;text-decoration-line:underline;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">CWE-497</span></a><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:124px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">ABB</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:357px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">ABB ASPECT-Enterprise ASP-ENT-x</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:262.766px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-7679" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;text-decoration-line:underline;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">CVE-2025-7679</span></a><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:96.0156px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">8.1</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:122.016px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">HIGH</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:98.5625px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">0.070%</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:104.531px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">21.840%</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:120.469px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;text-decoration-line:underline;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">CWE-306</span></a><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:124px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">Rockwell Automation</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:357px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">FactoryTalk Activation Manager</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:262.766px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-7970" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;text-decoration-line:underline;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">CVE-2025-7970</span></a><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:96.0156px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">7.5</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:122.016px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">HIGH</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:98.5625px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">0.041%</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:104.531px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">11.562%</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:120.469px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><a href="https://cwe.mitre.org/data/definitions/303.html" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;text-decoration-line:underline;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">CWE-303</span></a><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:124px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">Rockwell Automation</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:357px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">ControlLogix 5580</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:262.766px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9166" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;text-decoration-line:underline;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">CVE-2025-9166</span></a><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:96.0156px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">7.5</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:122.016px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">HIGH</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:98.5625px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">0.044%</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:104.531px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">12.709%</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:120.469px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><a href="https://cwe.mitre.org/data/definitions/476.html" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;text-decoration-line:underline;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">CWE-476</span></a><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:124px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">Rockwell Automation</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:357px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">1783-NATR</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:262.766px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-28895" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;text-decoration-line:underline;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">CVE-2020-28895</span></a><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:96.0156px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">7.3</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:122.016px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">HIGH</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:98.5625px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">0.456%</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:104.531px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">63.045%</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:120.469px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><a href="https://cwe.mitre.org/data/definitions/1103.html" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;text-decoration-line:underline;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">CWE-1103</span></a><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:124px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">Rockwell Automation</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:357px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">ThinManager</span></span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:262.766px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9065" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;text-decoration-line:underline;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">CVE-2025-9065</span></a><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:96.0156px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">7.2</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:122.016px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">HIGH</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:98.5625px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">0.039%</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:104.531px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">10.515%</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:120.469px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><a href="https://cwe.mitre.org/data/definitions/918.html" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;text-decoration-line:underline;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">CWE-918</span></a><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:124px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">Rockwell Automation</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:357px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">FactoryTalk Optix</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:262.766px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9161" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;text-decoration-line:underline;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">CVE-2025-9161</span></a><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:96.0156px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">7.1</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:122.016px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">HIGH</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:98.5625px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">0.298%</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:104.531px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">52.733%</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:120.469px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><a href="https://cwe.mitre.org/data/definitions/20.html" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;text-decoration-line:underline;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">CWE-20</span></a><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:124px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">Rockwell Automation</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:357px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">CompactLogix® 5480</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:262.766px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9160" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;text-decoration-line:underline;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">CVE-2025-9160</span></a><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:96.0156px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">6.8</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:122.016px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">MEDIUM</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:98.5625px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">0.022%</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:104.531px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">4.279%</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:120.469px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;text-decoration-line:underline;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">CWE-306</span></a><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td></tr><tr style="overflow:visible;height:20px;"><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:124px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">ABB</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:357px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">ABB ASPECT-Enterprise ASP-ENT-x</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:262.766px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-7677" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;text-decoration-line:underline;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">CVE-2025-7677</span></a><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:96.0156px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">5.9</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:122.016px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">MEDIUM</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:98.5625px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">0.052%</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:104.531px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">16.111%</span><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td><td style="padding:0px;overflow:visible;vertical-align:top;border:1px solid;width:120.469px;"><div style="padding-right:7px;padding-left:7px;overflow:visible;"><div style="clear:both;overflow:visible;direction:ltr;"><p style="vertical-align:baseline;color:windowtext;"><a href="https://cwe.mitre.org/data/definitions/120.html" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;text-decoration-line:underline;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">CWE-120</span></a><span style="font-size:12pt;line-height:18px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
</div></td></tr></tbody></table></div><br/></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="color:windowtext;font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:transparent;margin-bottom:13.3333px;vertical-align:baseline;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">-----&nbsp; </span><span style="font-size:12pt;line-height:20.7px;font-family:WordVisiCarriageReturn_MSFontService, Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"><span>&nbsp;</span><br/></span><span style="font-size:16pt;line-height:28.75px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;">Actualité Fortress Cybersecurity </span><span style="font-size:16pt;line-height:28.75px;font-family:WordVisiCarriageReturn_MSFontService, Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"><span>&nbsp;</span><br/></span><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"><span>Nos </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">dernières </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">publications :</span></span></p><p style="color:windowtext;font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:transparent;margin-bottom:13.3333px;vertical-align:baseline;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;"><span></span></span></span></p><div><p><a href="https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-25.s37">- Bilan des Known Exploited Vulnerabilities du mois d'août 2025</a></p></div><p></p></div>
<div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span style="line-height:20.7px;">- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span style="line-height:20.7px;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2025-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span style="line-height:20.7px;">Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span style="line-height:20.7px;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"><span>- 2 </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">octobre</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">2025 :</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Construire</span><span> le plan de protection </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">contre</span><span> la menace </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">cyber</span><span> de </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">ses</span><span> installations </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">industrielles</span><span>, inscription </span></span><a href="https://events.teams.microsoft.com/event/28618490-348d-42b3-a405-715ced3a9c0d%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">lien</span></a><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"><span>- 6 </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">novembre</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">2025 :</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">Cybersécurité</span><span> de la 5G </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">privée</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">en</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">environnement</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">industriel</span><span>, inscription </span></span><a href="https://events.teams.microsoft.com/event/9078c5c1-6c11-46de-b26f-10c9a073931d%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">lien</span></a><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div>
<div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"><span>- 4 </span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">décembre</span><span style="background-position:0px 100%;background-repeat:repeat-x;background-image:none !important;">2025 :</span><span> NIS 2 for Industry, inscription </span></span><a href="https://events.teams.microsoft.com/event/a70d0c3e-af20-4a3e-9b41-0a0f0f0a9d5e%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span style="color:rgb(0, 0, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">lien</span></a><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;">&nbsp;</span></p></div></div></div>
<p></p></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 14 Sep 2025 22:03:35 +0200</pubDate></item><item><title><![CDATA[Bilan des Known Exploited Vulnerabilities du mois de août 2025]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-août-2025</link><description><![CDATA[⚠️ En août 2025, l’agence de cybersécurité américaine (CISA) a ajouté 15 vulnérabilités , i dentifiées comme activement exploitées dans la cadre de cybe ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_oDkejEquSTCm9QqUenH7tg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_SIKykFb_TsWa-AUxhhWfNw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_QFmKC9SjRNSAyKRyxg67gg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_7SNFdUZukMdrsRG_8B6vOg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><p><span><span><span><span>⚠️ En août 2025, l’agence de cybersécurité américaine (CISA) a ajouté </span><span style="font-weight:700;">15 vulnérabilités</span><span>, i</span></span></span>dentifiées comme activement exploitées dans la cadre de cyberattaques, dans sa liste des Known Exploited Vulnerabilities (KEV), le nombre de KEV est en </span><span style="font-weight:700;">baisse (-5) </span><span>par rapport au mois précédent.</span></p><br/><p><span>☣️ 0 x KEV exploitées par un ransomware sur les produits des éditeurs suivants.</span></p><p><span>🔥 Editeurs concernés par les KEV : Apple, Citrix, D-Link, Git, Microsoft, N-able, RARLAB, Sangoma, Trend Micro.</span></p><br/><p><span style="font-weight:700;">La tendance générale sur les 12 derniers mois est, pour la première fois depuis deux ans, stable</span><span>.</span></p><p><span><br/></span></p><img src="/kev_202508.png"/><span><span><br/><br/><p><span>À date, 1406 KEV sont référencées.</span></p><p><br/></p><p><span>🎆 L'objectif de cette liste est de permettre aux organisations de prioriser leurs actions de patching. Afin de se rendre compte de l'importance des nouvelles entrées dans cette liste : toutes les agences de l’administration américaine doivent corriger ces vulnérabilités dans les 21 jours qui suivent l'ajout dans la liste !</span></p><br/><p><span>☣️ KEV exploitées par un ransomware :</span></p><p><span>N/A</span></p></span></span><span><span><p><span><br/></span></p><p><span>🔥 Liste des autres KEV :</span></p><p><span>3 x D-Link DCS-2530L and DCS-2670L Devices (CVE-2020-25078, CVE-2020-25079), DNR-322 (CVE-2022-40799)</span></p><p><span>3 x Citrix NetScaler (CVE-2025-7775), Session Recording (CVE-2024-8068, CVE-2024-8069)</span></p><p><span>2 x N-ableN-Central (CVE-2025-8875, CVE-2025-8876)</span></p><p><span>2 x Microsoft Internet Explorer (CVE-2013-3893), Office (CVE-2007-0671)</span></p><p><span>1 x Trend Micro Apex One (CVE-2025-54948)</span></p><p><span>1 x SangomaFreePBX (CVE-2025-57819)</span></p><p><span>1 x RARLABWinRAR (CVE-2025-8088)</span></p><p><span>1 x Git Git (CVE-2025-48384)</span></p><p><span>1 x Apple iOS, iPadOS, and macOS (CVE-2025-43300)</span></p><div><span><br/></span></div></span></span><p></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 08 Sep 2025 08:43:09 +0200</pubDate></item></channel></rss>