<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.fortress-cybersecurity.fr/blogs/author/théo/feed" rel="self" type="application/rss+xml"/><title>Site Institutionnel - Blog by Théo</title><description>Site Institutionnel - Blog by Théo</description><link>https://www.fortress-cybersecurity.fr/blogs/author/théo</link><lastBuildDate>Mon, 11 May 2026 06:00:08 +0200</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S17]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s17</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Cyber-risques 2026 par un assureur : Ce qu’il faut retenir&nbsp; Le rapport met en avant une activité cyber en hausse, avec des demandes d’indemnisatio ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><b></b></div></div></div><span><span><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><b></b></div></div></div><p><strong><span>Cyber-risques 2026 par un assureur : Ce qu’il faut retenir&nbsp;</span></strong></p><p><span><span>Le rapport met en avant une activité cyber en hausse, avec des demandes d’indemnisation en hausse de 40%. Les incidents déclarés concernent surtout les fuites de données et les attaques par extorsion. Les ransomwares restent très présent, puisqu’ils représentent 19% des incidents déclarés entre 2022 et 2025. Même si les attaques par ransomware continuent, les paiements de rançon baissent d’environ 44%. Cette baisse s’explique par de meilleures sauvegardes, une réponse plus rapide et des négociations mieux encadrées. Le rapport montre aussi que le facteur humain reste un point faible majeur. Le phishing, les fraudes par email, l’usurpation d’identité, les SMS frauduleux et les appels piégés restent des moyens simples et efficaces pour contourner les protections. Certains groupes ransomware ressortent particulièrement, comme Akira, lié à 38,8% des cas identifiés, et Qilin, lié à 14,2%. Cela montre qu’une partie importante des attaques est concentrée autour de quelques acteurs. Un autre point important concerne les incidents en chaîne : une faille chez un fournisseur ou un prestataire peut rapidement toucher plusieurs entreprises en même temps.</span></span></p><p><a href="https://cowbell.insure/wp-content/uploads/pdfs/CB-US-Media-CyberRoundup-2026ClaimsReport.pdf" title="https://cowbell.insure/wp-content/uploads/pdfs/CB-US-Media-CyberRoundup-2026ClaimsReport.pdf" rel="">https://cowbell.insure/wp-content/uploads/pdfs/CB-US-Media-CyberRoundup-2026ClaimsReport.pdf</a><br/></p><p><br/></p><p><strong>Analyse du malware ZionSiphon</strong><br/></p><p></p><p>L’article analyse ZionSiphon, un malware visant les environnements OT liés au traitement de l’eau et au dessalement en Israël.<span><span></span></span></p><p> Il se distingue en recherchant des protocoles industriels comme Modbus, DNP3 et S7comm et en ciblant uniquement des plages d’IP israéliennes. Néanmoins, le malware reste inoffensif :&nbsp;</p><ul><li>L’un des contrôles renvoie toujours faux et le malware finit par s’autodétruire.</li><li>Les paquets DNP3 et S7comm ne sont pas correctement formés</li></ul><p>Malgré ces limites, il illustre une tendance préoccupante, les acteurs malveillants commencent à expérimenter des attaques cyber-physiques contre des infrastructures critiques civiles.</p></span></span><p></p><p><a href="https://www.darktrace.com/blog/inside-zionsiphon-darktraces-analysis-of-ot-malware-targeting-israeli-water-systems" title="https://www.darktrace.com/blog/inside-zionsiphon-darktraces-analysis-of-ot-malware-targeting-israeli-water-systems" rel="">https://www.darktrace.com/blog/inside-zionsiphon-darktraces-analysis-of-ot-malware-targeting-israeli-water-systems</a><br/></p><p><br/></p><p><span><span></span></span></p><p></p><p></p><p><strong>Moins de données du NIST sur les vulnérabilités</strong></p><p>Cet article explique pourquoi le NIST réduit les informations fournies sur les vulnérabilités informatiques (CVE). Cette décision est due à un manque de budget, une baisse des effectifs et un nombre de signalements trop élevé. Désormais, le NIST analyse uniquement les failles de sécurité les plus critiques. Ce changement oblige donc les équipes de cybersécurité à s'adapter rapidement. Elles doivent désormais travailler avec moins de données fournies par le NIST pour protéger leurs systèmes.<br/></p><p><a href="https://www.darkreading.com/threat-intelligence/nist-cutbacks-nvd-handling-impacts-cyber-teams" title="https://www.darkreading.com/threat-intelligence/nist-cutbacks-nvd-handling-impacts-cyber-teams" rel="">https://www.darkreading.com/threat-intelligence/nist-cutbacks-nvd-handling-impacts-cyber-teams</a><br/></p><p><br/></p><p><span><span></span></span></p><p></p><p></p><p><strong>Exploitation des convertisseurs série-Ethernet dans les infrastructures critiques</strong></p><p>Dans cet article, Forescout (société de cybersecurité) détaille les failles de sécurité des convertisseurs Série-vers-Ethernet, massivement utilisés dans les infrastructures critiques (énergie, santé, industrie). Des chercheurs ont découvert 22 nouvelles vulnérabilités chez les constructeurs Lantronix et Silex, permettant des prises de contrôle à distance ou le sabotage de données. Ces appareils servent souvent de passerelles pour&nbsp; manipuler des équipements industriels ou paralyser des réseaux électriques En 2015, une cyberattaque contre l'Ukraine a délibérément corrompu le micrologiciel de plusieurs convertisseurs série-IP, rendant ainsi les sous-stations électriques inopérantes à distance. En 2025, ces appareils ont de nouveau été pris pour cible au sein du réseau électrique polonais.<br/></p><p><a href="https://www.forescout.com/blog/exploiting-serial-to-ethernet-converters-in-critical-infrastructure/" title="https://www.forescout.com/blog/exploiting-serial-to-ethernet-converters-in-critical-infrastructure/" rel="">https://www.forescout.com/blog/exploiting-serial-to-ethernet-converters-in-critical-infrastructure/</a><br/></p><p><span style="font-weight:bold;">&nbsp;</span><br/></p><p></p><p></p><p></p><p></p><div><p style="margin-bottom:13.3333px;"></p><div><div><p><span style="font-weight:bold;"><span>Vulnerability&nbsp;Corner :</span></span><span>&nbsp;</span></p></div><div><p><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div><div><div><table border="1"><tbody><tr><td style="vertical-align:top;width:164px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.875px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:264.609px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:774.391px;"><div><div><p><span>Liens&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:164px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27351" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2023-27351</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.875px;"><div><div><p><span>PaperCut&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:264.609px;"><div><div><p><span>NG/MF&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:774.391px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27351%2C%20https%3A//www.papercut.com/kb/Main/PO-1216-and-PO-1219" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>https://nvd.nist.gov/vuln/detail/CVE-2023-27351, https://www.papercut.com/kb/Main/PO-1216-and-PO-1219</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:164px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27199" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2024-27199</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.875px;"><div><div><p><span>JetBrains&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:264.609px;"><div><div><p><span>TeamCity&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:774.391px;"><div><div><p><span></span><a href="https://blog.jetbrains.com/teamcity/2024/03/additional-critical-security-issues-affecting-teamcity-on-premises-cve-2024-27198-and-cve-2024-27199-update-to-2023-11-4-now/%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2024-27199%2C%20https%3A//www.jetbrains.com/privacy-security/issues-fixed/" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>https://blog.jetbrains.com/teamcity/2024/03/additional-critical-security-issues-affecting-teamcity-on-premises-cve-2024-27198-and-cve-2024-27199-update-to-2023-11-4-now/, https://nvd.nist.gov/vuln/detail/CVE-2024-27199, https://www.jetbrains.com/privacy-security/issues-fixed/</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:164px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-2749" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2025-2749</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.875px;"><div><div><p><span>Kentico&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:264.609px;"><div><div><p><span>Kentico Xperience&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:774.391px;"><div><div><p><span></span><a href="https://devnet.kentico.com/download/hotfixes%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-2749" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>https://devnet.kentico.com/download/hotfixes, https://nvd.nist.gov/vuln/detail/CVE-2025-2749</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:164px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-32975" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2025-32975</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.875px;"><div><div><p><span>Quest&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:264.609px;"><div><div><p><span>KACE Systems Management Appliance (SMA)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:774.391px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-32975%2C%20https%3A//support.quest.com/kb/4379499/quest-response-to-kace-sma-vulnerabilities-cve-2025-32975-cve-2025-32976-cve-2025-32977-cve-2025-32978" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>https://nvd.nist.gov/vuln/detail/CVE-2025-32975, https://support.quest.com/kb/4379499/quest-response-to-kace-sma-vulnerabilities-cve-2025-32975-cve-2025-32976-cve-2025-32977-cve-2025-32978</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:164px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48700" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2025-48700</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.875px;"><div><div><p><span>Synacor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:264.609px;"><div><div><p><span>Zimbra Collaboration Suite (ZCS)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:774.391px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48700%2C%20https%3A//wiki.zimbra.com/wiki/Zimbra_Security_Advisories" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>https://nvd.nist.gov/vuln/detail/CVE-2025-48700, https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:164px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20122" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-20122</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.875px;"><div><div><p><span>Cisco&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:264.609px;"><div><div><p><span>Catalyst SD-WAN Manger&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:774.391px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20122%2C%20https%3A//sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v%2C%20https%3A//www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems%2C%20https%3A//www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>https://nvd.nist.gov/vuln/detail/CVE-2026-20122, https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v, https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems, https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:164px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20128" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-20128</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.875px;"><div><div><p><span>Cisco&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:264.609px;"><div><div><p><span>Catalyst SD-WAN Manager&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:774.391px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20128%2C%20https%3A//sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v%2C%20https%3A//www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems%2C%20https%3A//www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>https://nvd.nist.gov/vuln/detail/CVE-2026-20128, https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v, https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems, https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:164px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20133" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-20133</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.875px;"><div><div><p><span>Cisco&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:264.609px;"><div><div><p><span>Catalyst SD-WAN Manager&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:774.391px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20133%2C%20https%3A//sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v%2C%20https%3A//www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems%2C%20https%3A//www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>https://nvd.nist.gov/vuln/detail/CVE-2026-20133, https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v, https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems, https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:164px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33825" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-33825</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.875px;"><div><div><p><span>Microsoft&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:264.609px;"><div><div><p><span>Defender&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:774.391px;"><div><div><p><span></span><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-33825" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825, https://nvd.nist.gov/vuln/detail/CVE-2026-33825</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:164px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-39987" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-39987</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.875px;"><div><div><p><span>Marimo&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:264.609px;"><div><div><p><span>Marimo&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:774.391px;"><div><div><p><span></span><a href="https://github.com/marimo-team/marimo/security/advisories/GHSA-2679-6mx9-h9xc%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-39987" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>https://github.com/marimo-team/marimo/security/advisories/GHSA-2679-6mx9-h9xc, https://nvd.nist.gov/vuln/detail/CVE-2026-39987</span></span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p><span>&nbsp;</span></p></div><div><p><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div><div><p><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div><div><div><table border="1"><tbody><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Critical&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>High&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Medium&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Low&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Total&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Silex Technology&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>SD-330AC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>9&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>13&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>SenseLive&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>X3050&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>11&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Milesight&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>MS-Cxx63-PD&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>5&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>SpiceJet&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Online Booking System&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>2&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Hardy Barth&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Salia Board Firmware&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>2&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Zero Motorcycles&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Zero Motorcycles firmware&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Hangzhou&nbsp;Xiongmai&nbsp;Technology Co., Ltd&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>IP Camera XM530V200_X6-WEQ_8M firmware&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Intrado&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Emergency Gateway&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Yadea&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>T5 Electric Bicycle&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Carlson Software&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>VASCO-B GNSS Receiver&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p><span>&nbsp;</span></p></div><div><p><span>&nbsp;</span></p></div><div><p><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p></div><div><div><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Score&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Severity&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EPSS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Percentile&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CWE&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Hangzhou&nbsp;Xiongmai&nbsp;Technology Co., Ltd&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>IP Camera XM530V200_X6-WEQ_8M firmware&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-65856" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2025-65856</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.633%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>70.441%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-306</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Intrado&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Emergency Gateway&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-6074" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-6074</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/35.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-35</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Milesight&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MS-Cxx63-PD&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32644" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-32644</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/321.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-321</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SenseLive&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>X3050&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25775" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-25775</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-306</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SenseLive&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>X3050&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-35503" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-35503</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/798.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-798</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SenseLive&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>X3050&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-40620" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-40620</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-306</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SenseLive&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>X3050&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-40630" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-40630</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/288.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-288</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Silex Technology&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SD-330AC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32956" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-32956</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.043%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>13.338%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/122.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-122</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Carlson Software&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>VASCO-B GNSS Receiver&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3893" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-3893</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-306</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SenseLive&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>X3050&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27843" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-27843</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-306</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Milesight&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MS-Cxx63-PD&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20766" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-20766</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/122.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-122</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Milesight&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MS-Cxx63-PD&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27785" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-27785</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/798.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-798</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Silex Technology&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SD-330AC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32955" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-32955</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.043%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>13.229%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/121.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-121</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SenseLive&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>X3050&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27841" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-27841</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/352.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-352</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SenseLive&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>X3050&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-39462" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-39462</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-522</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SenseLive&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>X3050&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-40623" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-40623</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-862</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SenseLive&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>X3050&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-35064" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-35064</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-306</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Silex Technology&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SD-330AC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-5621" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2015-5621</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>13.928%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>94.350%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/1395.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-1395</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Silex Technology&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SD-330AC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32965" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-32965</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.029%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.283%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/1188.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-1188</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SpiceJet&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Online Booking System&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-6375" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-6375</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/639.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-639</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SpiceJet&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Online Booking System&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-6376" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-6376</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-306</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Hardy Barth&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Salia Board Firmware&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-10371" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2025-10371</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.061%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>19.190%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/434.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-434</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yadea&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>T5 Electric Bicycle&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-70994" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2025-70994</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/1390.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-1390</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Milesight&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MS-Cxx63-PD&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28747" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-28747</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/639.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-639</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Milesight&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MS-Cxx63-PD&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32649" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-32649</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-78</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Silex Technology&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SD-330AC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24487" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2024-24487</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.635%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>70.483%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/266.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-266</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Silex Technology&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SD-330AC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32958" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-32958</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.028%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.015%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/321.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-321</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Silex Technology&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SD-330AC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32960" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-32960</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.016%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.700%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/226.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-226</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Silex Technology&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SD-330AC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32964" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-32964</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.043%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>13.021%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/93.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-93</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Zero Motorcycles&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Zero Motorcycles firmware&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1354" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-1354</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.020%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.648%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/322.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-322</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Hardy Barth&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Salia Board Firmware&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-5873" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2025-5873</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.173%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>38.728%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/434.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-434</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Silex Technology&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SD-330AC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32963" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-32963</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.030%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.540%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-79</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Silex Technology&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SD-330AC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32959" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-32959</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.9&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.018%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.584%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/327.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-327</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SenseLive&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>X3050&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25720" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-25720</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/613.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-613</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SenseLive&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>X3050&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-40431" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-40431</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/319.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-319</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Silex Technology&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SD-330AC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32957" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-32957</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.052%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>16.419%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-306</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Silex Technology&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SD-330AC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32961" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-32961</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.021%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.688%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/122.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-122</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Silex Technology&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SD-330AC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32962" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-32962</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.052%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;" class="zp-selected-cell"><div><div><p><span>16.419%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-306</span></span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p><span>&nbsp;</span></p></div><div><p><span>-----&nbsp;<br/></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br/></span></p></div><div><p><span><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-mars-2027" target="_blank" rel="">- Bilan des Known Exploited Vulnerabilities du mois de mars 202</a><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-mars-2027" target="_blank" rel="">6</a>&nbsp;</span><br/></p></div><div><p><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div><div><p><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div></div><br/><p></p></div><p></p><div><div></div><br/></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 26 Apr 2026 19:42:17 +0200</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S16]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s16</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Panorama des menaces sur l'industrie manufacturière en 2026 : En 2025, le secteur manufacturier a été confronté à une forte augmentation des cybermenac ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><b></b></div></div></div><span><span><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><b></b></div></div></div><p><strong>Panorama des menaces sur l'industrie manufacturière en 2026 :</strong></p><p>En 2025, le secteur manufacturier a été confronté à une forte augmentation des cybermenaces, les incidents liés aux ransomwares visant ce secteur ont augmentés de 56 % par rapport à l'année précédente. Au troisième trimestre, l'Europe a enregistré 162 incidents, se positionnant derrière les Etats Unis en nombre d'attaques subies par ransomware. En revanche, d’autres régions comme le Brésil, l’Inde et la Chine sont moins touchées par ce type d’attaque (25 cas), mais davantage par des actions de défacement de sites publics, qui ont atteint environ 190 incidents. Ces tendances montrent que la menace cyber évolue différemment selon les régions</p><p><a href="https://checkpoint.cyberint.com/manufacturing-threat-landscape" title="https://checkpoint.cyberint.com/manufacturing-threat-landscape" rel="">https://checkpoint.cyberint.com/manufacturing-threat-landscape</a><br/></p><p><br/></p><p><strong>L'enjeu de la centralisation des achats pour la cybersécurité :</strong><br/></p><p></p><p>Dans cet article, l'éditeur Meritalk explique la difficulté de protéger à la fois les réseaux informatiques et les systèmes opérationnels. Ce problème vient de l'organisation des budgets, et non d'un manque de solution technologique. Aujourd'hui, les budgets sont répartis entre différents départements qui achètent leurs outils de sécurité de leur côté. Le regroupement des financements via des contrats globaux est la condition nécessaire pour standardiser efficacement la sécurité de tous les équipements.</p><p>&nbsp;<a href="https://www.meritalk.com/eliminating-silos-in-it-ot-cybersecurity-is-a-funding-challenge-not-a-technical-one/" title="https://www.meritalk.com/eliminating-silos-in-it-ot-cybersecurity-is-a-funding-challenge-not-a-technical-one/" rel="">https://www.meritalk.com/eliminating-silos-in-it-ot-cybersecurity-is-a-funding-challenge-not-a-technical-one/</a><br/></p><p><br/></p><p></p><p></p><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnerability&nbsp;Corner :</span>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</p></div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:176px;" class="zp-selected-cell"><div><p>CVE&nbsp;</p></div></td><td style="vertical-align:top;width:143.891px;"><div><p>Vendor&nbsp;</p></div></td><td style="vertical-align:top;width:294.281px;"><div><p>Product&nbsp;</p></div></td><td style="vertical-align:top;width:674.719px;"><div><p>Liens&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:176px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2009-0238" target="_blank" rel="noreferrer noopener">CVE-2009-0238</a>&nbsp;</p></div></td><td style="vertical-align:top;width:143.891px;"><div><p>Microsoft&nbsp;</p></div></td><td style="vertical-align:top;width:294.281px;"><div><p>Office&nbsp;</p></div></td><td style="vertical-align:top;width:674.719px;"><div><p><a href="https://learn.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-009%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2009-0238" target="_blank" rel="noreferrer noopener">https://learn.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-009, https://nvd.nist.gov/vuln/detail/CVE-2009-0238</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:176px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2012-1854" target="_blank" rel="noreferrer noopener">CVE-2012-1854</a>&nbsp;</p></div></td><td style="vertical-align:top;width:143.891px;"><div><p>Microsoft&nbsp;</p></div></td><td style="vertical-align:top;width:294.281px;"><div><p>Visual Basic for Applications (VBA)&nbsp;</p></div></td><td style="vertical-align:top;width:674.719px;"><div><p><a href="https://learn.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-046%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2012-1854" target="_blank" rel="noreferrer noopener">https://learn.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-046, https://nvd.nist.gov/vuln/detail/CVE-2012-1854</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:176px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-9715" target="_blank" rel="noreferrer noopener">CVE-2020-9715</a>&nbsp;</p></div></td><td style="vertical-align:top;width:143.891px;"><div><p>Adobe&nbsp;</p></div></td><td style="vertical-align:top;width:294.281px;"><div><p>Acrobat&nbsp;</p></div></td><td style="vertical-align:top;width:674.719px;"><div><p><a href="https://helpx.adobe.com/security/products/acrobat/apsb20-48.html%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2020-9715" target="_blank" rel="noreferrer noopener">https://helpx.adobe.com/security/products/acrobat/apsb20-48.html, https://nvd.nist.gov/vuln/detail/CVE-2020-9715</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:176px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-21529" target="_blank" rel="noreferrer noopener">CVE-2023-21529</a>&nbsp;</p></div></td><td style="vertical-align:top;width:143.891px;"><div><p>Microsoft&nbsp;</p></div></td><td style="vertical-align:top;width:294.281px;"><div><p>Exchange Server&nbsp;</p></div></td><td style="vertical-align:top;width:674.719px;"><div><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21529%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2023-21529" target="_blank" rel="noreferrer noopener">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21529, https://nvd.nist.gov/vuln/detail/CVE-2023-21529</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:176px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-36424" target="_blank" rel="noreferrer noopener">CVE-2023-36424</a>&nbsp;</p></div></td><td style="vertical-align:top;width:143.891px;"><div><p>Microsoft&nbsp;</p></div></td><td style="vertical-align:top;width:294.281px;"><div><p>Windows&nbsp;</p></div></td><td style="vertical-align:top;width:674.719px;"><div><p><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2023-36424%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2023-36424" target="_blank" rel="noreferrer noopener">https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2023-36424, https://nvd.nist.gov/vuln/detail/CVE-2023-36424</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:176px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-60710" target="_blank" rel="noreferrer noopener">CVE-2025-60710</a>&nbsp;</p></div></td><td style="vertical-align:top;width:143.891px;"><div><p>Microsoft&nbsp;</p></div></td><td style="vertical-align:top;width:294.281px;"><div><p>Windows&nbsp;</p></div></td><td style="vertical-align:top;width:674.719px;"><div><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60710%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-60710" target="_blank" rel="noreferrer noopener">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60710, https://nvd.nist.gov/vuln/detail/CVE-2025-60710</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:176px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21643" target="_blank" rel="noreferrer noopener">CVE-2026-21643</a>&nbsp;</p></div></td><td style="vertical-align:top;width:143.891px;"><div><p>Fortinet&nbsp;</p></div></td><td style="vertical-align:top;width:294.281px;"><div><p>FortiClient EMS&nbsp;</p></div></td><td style="vertical-align:top;width:674.719px;"><div><p><a href="https://fortiguard.fortinet.com/psirt/FG-IR-25-1142%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-21643" target="_blank" rel="noreferrer noopener">https://fortiguard.fortinet.com/psirt/FG-IR-25-1142, https://nvd.nist.gov/vuln/detail/CVE-2026-21643</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:176px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32201" target="_blank" rel="noreferrer noopener">CVE-2026-32201</a>&nbsp;</p></div></td><td style="vertical-align:top;width:143.891px;"><div><p>Microsoft&nbsp;</p></div></td><td style="vertical-align:top;width:294.281px;"><div><p>SharePoint Server&nbsp;</p></div></td><td style="vertical-align:top;width:674.719px;"><div><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-32201%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-32201" target="_blank" rel="noreferrer noopener">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-32201, https://nvd.nist.gov/vuln/detail/CVE-2026-32201</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:176px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-34197" target="_blank" rel="noreferrer noopener">CVE-2026-34197</a>&nbsp;</p></div></td><td style="vertical-align:top;width:143.891px;"><div><p>Apache&nbsp;</p></div></td><td style="vertical-align:top;width:294.281px;"><div><p>ActiveMQ&nbsp;</p></div></td><td style="vertical-align:top;width:674.719px;"><div><p><a href="https://activemq.apache.org/security-advisories.data/CVE-2026-34197-announcement.txt%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-34197" target="_blank" rel="noreferrer noopener">https://activemq.apache.org/security-advisories.data/CVE-2026-34197-announcement.txt, https://nvd.nist.gov/vuln/detail/CVE-2026-34197</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:176px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-34621" target="_blank" rel="noreferrer noopener">CVE-2026-34621</a>&nbsp;</p></div></td><td style="vertical-align:top;width:143.891px;"><div><p>Adobe&nbsp;</p></div></td><td style="vertical-align:top;width:294.281px;"><div><p>Acrobat and Reader&nbsp;</p></div></td><td style="vertical-align:top;width:674.719px;"><div><p><a href="https://helpx.adobe.com/security/products/acrobat/apsb26-43.html%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-34621" target="_blank" rel="noreferrer noopener">https://helpx.adobe.com/security/products/acrobat/apsb26-43.html, https://nvd.nist.gov/vuln/detail/CVE-2026-34621</a>&nbsp;</p></div></td></tr></tbody></table></div><div><p style="margin-bottom:13.3333px;">&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</p></div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:82px;"><div><p>Vendor&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Product&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Critical&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>High&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Medium&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Low&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Total&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Anviz&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>CX2 Lite Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>6&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>5&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>12&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>AVEVA&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Pipeline Simulation&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Delta Electronics&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>ASDA-Soft&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Horner Automation&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Cscape&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr></tbody></table></div><div><p style="margin-bottom:13.3333px;">&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</p></div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><p>Vendor&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Product&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CVE&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CVSSv3 Score&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CVSSv3 Severity&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>EPSS&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Percentile&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CWE&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Anviz&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CX2 Lite Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-35546" target="_blank" rel="noreferrer noopener">CVE-2026-35546</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener">CWE-306</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>AVEVA&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Pipeline Simulation&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-5387" target="_blank" rel="noreferrer noopener">CVE-2026-5387</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.1&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.041%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>12.369%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer noopener">CWE-862</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Horner Automation&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Cscape&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-6284" target="_blank" rel="noreferrer noopener">CVE-2026-6284</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.1&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/521.html" target="_blank" rel="noreferrer noopener">CWE-521</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Anviz&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CX2 Lite Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-35682" target="_blank" rel="noreferrer noopener">CVE-2026-35682</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/77.html" target="_blank" rel="noreferrer noopener">CWE-77</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Anviz&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CX2 Lite Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-40066" target="_blank" rel="noreferrer noopener">CVE-2026-40066</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/494.html" target="_blank" rel="noreferrer noopener">CWE-494</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Anviz&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CX2 Lite Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-40434" target="_blank" rel="noreferrer noopener">CVE-2026-40434</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.1&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/940.html" target="_blank" rel="noreferrer noopener">CWE-940</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Delta Electronics&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>ASDA-Soft&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-5726" target="_blank" rel="noreferrer noopener">CVE-2026-5726</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.005%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.255%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/121.html" target="_blank" rel="noreferrer noopener">CWE-121</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Anviz&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CX2 Lite Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32324" target="_blank" rel="noreferrer noopener">CVE-2026-32324</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.7&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/321.html" target="_blank" rel="noreferrer noopener">CWE-321</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Anviz&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CX2 Lite Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32650" target="_blank" rel="noreferrer noopener">CVE-2026-32650</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/757.html" target="_blank" rel="noreferrer noopener">CWE-757</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Anviz&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CX2 Lite Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-40461" target="_blank" rel="noreferrer noopener">CVE-2026-40461</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener">CWE-306</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Anviz&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CX2 Lite Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33569" target="_blank" rel="noreferrer noopener">CVE-2026-33569</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/319.html" target="_blank" rel="noreferrer noopener">CWE-319</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Anviz&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CX2 Lite Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32648" target="_blank" rel="noreferrer noopener">CVE-2026-32648</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>5.3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer noopener">CWE-862</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Anviz&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CX2 Lite Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33093" target="_blank" rel="noreferrer noopener">CVE-2026-33093</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>5.3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer noopener">CWE-862</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Anviz&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CX2 Lite Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-35061" target="_blank" rel="noreferrer noopener">CVE-2026-35061</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>5.3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer noopener">CWE-862</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Anviz&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CX2 Lite Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-31927" target="_blank" rel="noreferrer noopener">CVE-2026-31927</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>4.9&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/23.html" target="_blank" rel="noreferrer noopener">CWE-23</a>&nbsp;</p></div></td></tr></tbody></table></div><div><p style="margin-bottom:13.3333px;">&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">-----&nbsp;<br/><span style="font-weight:bold;">Actualité Fortress Cybersecurity</span>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-mars-2027" target="_blank" rel="">- Bilan des Known Exploited Vulnerabilities du mois de mars 202</a><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-mars-2027" target="_blank" rel="">6</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener">- Nouveau guide de classification des actifs industriels publié par l'ANSSI</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener">Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div></div><p><br/></p><p></p><p><br/></p><p></p><div><div></div><br/></div></span></span></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 19 Apr 2026 22:18:59 +0200</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S13]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s13</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Fuite de données chez AstraZeneca : Une fuite de données supposée chez AstraZeneca, revendiquée par un groupe de hackers appelé LAPSUS. Il est importan ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div><div><div><div><p style="font-weight:bold;">Fuite de données chez AstraZeneca :</p><p>Une fuite de données supposée chez AstraZeneca, revendiquée par un groupe de hackers appelé LAPSUS. Il est important de noter que ce n’est pas encore officiellement confirmé par AstraZeneca au moment de l’article. Les hackers affirment avoir volé des codes sources d'application, des fichiers d'infrastructure, des scripts SQL mais aucune données patients.</p><p><a href="https://socradar.io/blog/astrazeneca-data-breach-what-to-know/">https://socradar.io/blog/astrazeneca-data-breach-what-to-know/</a></p><p><br/></p><p><span><span style="font-weight:700;"><span>Guide sur la cybersécurité, la gestion des risques d'entreprise et la gestion des effectifs</span> :</span></span></p><p>Une publication récente du NIST, la SP 1308, détaille comment aligner les enjeux de cybersécurité, la gestion des risques d’entreprise et la gestion des compétences pour une approche cohérente.</p><p><span></span></p><p>Basé sur le Cybersecurity Framework 2.0 (CSF 2.0) et NICE Framework qui permet de gérer les compétences des équipes en charge de la cybersécurité, cette publication montre que les décisions de gestion des effectifs (recrutement, formation) doivent être directement pilotées par les risques cyber identifiés afin d’améliorer l’efficacité globale.</p><p><a href="https://csrc.nist.gov/pubs/sp/1308/final">https://csrc.nist.gov/pubs/sp/1308/final</a></p></div>
<br/><div><p style="margin-bottom:13.3333px;"></p><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnerability&nbsp;Corner :</span></span><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div>
<p></p><table border="1"><tbody><tr><td style="vertical-align:top;width:186px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:130.734px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:123.203px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:873.797px;"><div><p><strong>Liens&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:186px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33017" target="_blank" rel="noreferrer noopener">CVE-2026-33017</a>&nbsp;</p></div></td><td style="vertical-align:top;width:130.734px;"><div><p>Langflow&nbsp;</p></div></td><td style="vertical-align:top;width:123.203px;"><div><p>Langflow&nbsp;</p></div></td><td style="vertical-align:top;width:873.797px;" class="zp-selected-cell"><div><p><a href="https://github.com/langflow-ai/langflow/security/advisories/GHSA-vwmf-pq79-vjvx%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-33017" target="_blank" rel="noreferrer noopener">https://github.com/langflow-ai/langflow/security/advisories/GHSA-vwmf-pq79-vjvx, https://nvd.nist.gov/vuln/detail/CVE-2026-33017</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:186px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33634" target="_blank" rel="noreferrer noopener">CVE-2026-33634</a>&nbsp;</p></div></td><td style="vertical-align:top;width:130.734px;"><div><p>Aquasecurity&nbsp;</p></div></td><td style="vertical-align:top;width:123.203px;"><div><p>Trivy&nbsp;</p></div></td><td style="vertical-align:top;width:873.797px;"><div><p><a href="https://github.com/advisories/GHSA-69fq-xp46-6x23%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-33634" target="_blank" rel="noreferrer noopener">https://github.com/advisories/GHSA-69fq-xp46-6x23, https://nvd.nist.gov/vuln/detail/CVE-2026-33634</a>&nbsp;</p></div></td></tr></tbody></table><div><div style="margin-bottom:2px;"></div>
</div><p style="margin-bottom:13.3333px;"></p><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div>
<p></p><table border="1"><tbody><tr><td style="vertical-align:top;width:82px;" class="zp-selected-cell"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Critical&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>High&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Medium&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Low&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Total&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Schneider Electric&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>ProLeiT&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>2&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>4&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Grassroots&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Grassroots DICOM (GDCM)&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>OpenCode&nbsp;Systems&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>OC Messaging&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Pharos Controls&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Mosaic Show Controller Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>PTC&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Windchill&nbsp;PDMLink&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>WAGO&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Hardware&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr></tbody></table><div><div style="margin-bottom:2px;"></div>
</div><p style="margin-bottom:13.3333px;"></p><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p></div>
<p></p><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVSSv3 Score&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVSSv3 Severity&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>EPSS&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>Percentile&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CWE&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>PTC&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Windchill&nbsp;PDMLink&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-4681" target="_blank" rel="noreferrer noopener">CVE-2026-4681</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>10.0&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.378%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>59.201%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/94.html" target="_blank" rel="noreferrer noopener">CWE-94</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Schneider Electric&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>ProLeiT&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-49844" target="_blank" rel="noreferrer noopener">CVE-2025-49844</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>10&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>10.910%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>93.350%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/416.html" target="_blank" rel="noreferrer noopener">CWE-416</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>WAGO&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Hardware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3587" target="_blank" rel="noreferrer noopener">CVE-2026-3587</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>10&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.090%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;" class="zp-selected-cell"><div><p>25.634%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/912.html" target="_blank" rel="noreferrer noopener">CWE-912</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Pharos Controls&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Mosaic Show Controller Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-2417" target="_blank" rel="noreferrer noopener">CVE-2026-2417</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.101%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>27.930%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener">CWE-306</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>OpenCode&nbsp;Systems&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>OC Messaging&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-70614" target="_blank" rel="noreferrer noopener">CVE-2025-70614</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.1&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.032%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.101%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/284.html" target="_blank" rel="noreferrer noopener">CWE-284</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Grassroots&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Grassroots DICOM (GDCM)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3650" target="_blank" rel="noreferrer noopener">CVE-2026-3650</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/401.html" target="_blank" rel="noreferrer noopener">CWE-401</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Schneider Electric&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>ProLeiT&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-46817" target="_blank" rel="noreferrer noopener">CVE-2025-46817</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>13.200%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>94.079%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/190.html" target="_blank" rel="noreferrer noopener">CWE-190</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Schneider Electric&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>ProLeiT&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-46819" target="_blank" rel="noreferrer noopener">CVE-2025-46819</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6.3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>5.046%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>89.713%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/190.html" target="_blank" rel="noreferrer noopener">CWE-190</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Schneider Electric&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>ProLeiT&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-46818" target="_blank" rel="noreferrer noopener">CVE-2025-46818</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>3.178%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>86.887%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/94.html" target="_blank" rel="noreferrer noopener">CWE-94</a>&nbsp;</p></div></td></tr></tbody></table><div><div><div style="margin-bottom:2px;"></div>
</div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br/></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br/> &nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-janvier-2026" title="- Bilan des Known Exploited Vulnerabilities du mois de&nbsp;janvier 2025" target="_blank" rel="">- </a><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-janvier-2026" title="- Bilan des Known Exploited Vulnerabilities du mois de&nbsp;janvier 2025" target="_blank" rel="">Bilan des Known Exploited Vulnerabilities du mois de&nbsp;</a><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-janvier-2026" title="- Bilan des Known Exploited Vulnerabilities du mois de&nbsp;janvier 2025" target="_blank" rel="">janvier 2025</a></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
</div><p style="margin-bottom:13.3333px;"><br/></p></div></div><div><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"></div>
</div></div></div></div></div></div></div></div></div><div><div><div></div></div>
</div></div><div><div><div></div></div></div></div></div></div></div></div></div>
</div> ]]></content:encoded><pubDate>Mon, 30 Mar 2026 07:59:15 +0200</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S12]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s12</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Warlock une attaque ransomware sophistiquée : Cet article décrit une attaque du groupe Warlock où les attaquants exploitent une faille SharePoint pour ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div><div><div><p style="margin-bottom:13.3333px;"></p><p style="font-weight:bold;">Warlock une attaque ransomware sophistiquée :</p><p>Cet article décrit une attaque du groupe Warlock où les attaquants exploitent une faille SharePoint pour l'accès initial dans les systèmes de la victime. rester discrets pendant plusieurs jours, puis utiliser des outils légitimes notamment Visual Studio Code pour la prise en main à distance sans être détectés avant d’exfiltrer les données et déployer le ransomware à grande échelle. Il met en évidence des techniques avancées d’évasion et de persistance.</p><span><span><p><span><a href="https://www.trendmicro.com/fr_fr/research/26/c/dissecting-a-warlock-attack.html" target="_blank">https://www.trendmicro.com/fr_fr/research/26/c/dissecting-a-warlock-attack.html</a><span>&nbsp;</span></span><br/></p><p><span><span><br/></span></span></p><p><strong>KVM IP une faille critique sous-estimée :</strong></p><p>Un KVM IP (Keyboard, Video, Mouse) permet de contrôler un ordinateur à distance comme si on était physiquement devant, même au niveau BIOS. L’article montre que plusieurs KVM IP low-cost (<span><span>Sipeed,&nbsp;<span><span>JetKVM, etc.)</span></span></span></span> contiennent des vulnérabilités majeures (pas de vérification de firmware, absence de protection brute-force, accès non authentifié) permettant à un acteur de la menace cyber de prendre le contrôle total du KVM IP et potentiellement prendre le contrôle du PC si celui-ci n'est pas renforcé. Exemple avec les HMI, il n 'y a pas d'authentification au niveau de la session, l'acteur accède directement aux applications du HMI.</p></span></span><a href="https://eclypsium.com/blog/your-kvm-is-the-weak-link-how-30-dollar-devices-can-own-your-entire-network/">https://eclypsium.com/blog/your-kvm-is-the-weak-link-how-30-dollar-devices-can-own-your-entire-network/</a><br/><p></p><p style="margin-bottom:13.3333px;"><br/></p><p style="margin-bottom:13.3333px;"><strong>L'état de la cybersécurité dans le secteur industriel :</strong><br/></p><p style="margin-bottom:13.3333px;"><span><span>L'échantillon de l'étude comprend des petites (<span>moins de 1 000 employés)</span>, moyennes(entre 1000 et 10 000 employés) et grandes <span>entreprises&nbsp;</span>(plus de 10 000 employés) .&nbsp;</span>La majorité des cyberattaques sur les systèmes OT perturbent la production, avec environ 77 % des organisation ont expérimentés un incident cyber la dernière année. Le rapport montre également&nbsp; que malgré des budgets entre 6 millions et 25millions, 62 % des organisations ont moins de 10 employés dédiés à la cybersécurité industrielle. Dans ce contexte, l'étude confirme les tendances que les entreprises recherchent à externaliser et automatiser leur activités <span>cybersécurité&nbsp;</span>sur le périmètre industrielle.<br/></span><a href="https://assets.siemens-energy.com/dam/3307e8a8-e853-4c24-aa19-b2f900817951/State-of-OT-cybersecurity-for-energy-and-related-industries-pdf_Original%20file.pdf">https://assets.siemens-energy.com/dam/3307e8a8-e853-4c24-aa19-b2f900817951/State-of-OT-cybersecurity-for-energy-and-related-industries-pdf_Original%20file.pdf</a><br/></p><p style="margin-bottom:13.3333px;"></p><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnerability&nbsp;Corner :</span>&nbsp;</p><div><p style="margin-bottom:13.3333px;">Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;</p></div></div><p></p><table border="1" style="height:133.312px;"><tbody><tr><td style="vertical-align:top;width:144px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:177.25px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:376.312px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:495.688px;"><div><p><strong>Liens&nbsp;</strong></p></div></td></tr><tr style="height:59.0156px;"><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-47813" target="_blank" rel="noreferrer noopener">CVE-2025-47813</a>&nbsp;</p></div></td><td style="vertical-align:top;width:177.25px;"><div><p>Wing FTP Server&nbsp;</p></div></td><td style="vertical-align:top;width:376.312px;"><div><p>Wing FTP Server&nbsp;</p></div></td><td style="vertical-align:top;width:495.688px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-47813%2C%20https%3A//www.wftpserver.com/serverhistory.htm" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2025-47813, https://www.wftpserver.com/serverhistory.htm</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66376" target="_blank" rel="noreferrer noopener">CVE-2025-66376</a>&nbsp;</p></div></td><td style="vertical-align:top;width:177.25px;"><div><p>Synacor&nbsp;</p></div></td><td style="vertical-align:top;width:376.312px;"><div><p>Zimbra Collaboration Suite (ZCS)&nbsp;</p></div></td><td style="vertical-align:top;width:495.688px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66376%2C%20https%3A//wiki.zimbra.com/wiki/Zimbra_Security_Advisories" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2025-66376, https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20131" target="_blank" rel="noreferrer noopener">CVE-2026-20131</a>&nbsp;</p></div></td><td style="vertical-align:top;width:177.25px;"><div><p>Cisco&nbsp;</p></div></td><td style="vertical-align:top;width:376.312px;"><div><p>Secure Firewall Management Center (FMC)&nbsp;</p></div></td><td style="vertical-align:top;width:495.688px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20131%2C%20https%3A//sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2026-20131, https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20963" target="_blank" rel="noreferrer noopener">CVE-2026-20963</a>&nbsp;</p></div></td><td style="vertical-align:top;width:177.25px;"><div><p>Microsoft&nbsp;</p></div></td><td style="vertical-align:top;width:376.312px;"><div><p>SharePoint&nbsp;</p></div></td><td style="vertical-align:top;width:495.688px;"><div><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20963%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-20963" target="_blank" rel="noreferrer noopener">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20963, https://nvd.nist.gov/vuln/detail/CVE-2026-20963</a>&nbsp;</p></div></td></tr></tbody></table><p style="margin-bottom:13.3333px;"><span><span style="font-weight:bold;"><br/></span></span></p><p style="margin-bottom:13.3333px;"><span><span style="font-weight:bold;">Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span>&nbsp;</span></p><table border="1"><tbody><tr><td style="vertical-align:top;width:258px;"><div><p>V<strong>endor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:512px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:102.172px;"><div><p><strong>Critical&nbsp;</strong></p></div></td><td style="vertical-align:top;width:110.156px;"><div><p><strong>High&nbsp;</strong></p></div></td><td style="vertical-align:top;width:120.031px;"><div><p><strong>Medium&nbsp;</strong></p></div></td><td style="vertical-align:top;width:101.062px;"><div><p><strong>Low&nbsp;</strong></p></div></td><td style="vertical-align:top;width:110.406px;"><div><p><strong>Total&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:258px;"><div><p>CTEK&nbsp;</p></div></td><td style="vertical-align:top;width:512px;"><div><p>Chargeportal&nbsp;</p></div></td><td style="vertical-align:top;width:102.172px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:110.156px;"><div><p>2&nbsp;</p></div></td><td style="vertical-align:top;width:120.031px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:101.062px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:110.406px;"><div><p>4&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:258px;"><div><p>IGL-Technologies&nbsp;</p></div></td><td style="vertical-align:top;width:512px;"><div><p>eParking.fi&nbsp;</p></div></td><td style="vertical-align:top;width:102.172px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:110.156px;"><div><p>2&nbsp;</p></div></td><td style="vertical-align:top;width:120.031px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:101.062px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:110.406px;"><div><p>4&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:258px;"><div><p>Automated Logic&nbsp;</p></div></td><td style="vertical-align:top;width:512px;"><div><p>WebCTRL&nbsp;Premium Server&nbsp;</p></div></td><td style="vertical-align:top;width:102.172px;" class="zp-selected-cell"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:110.156px;"><div><p>2&nbsp;</p></div></td><td style="vertical-align:top;width:120.031px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:101.062px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:110.406px;"><div><p>3&nbsp;</p></div></td></tr></tbody></table><div></div><p style="margin-bottom:13.3333px;"><span><br/></span></p><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p><p style="margin-bottom:13.3333px;"></p><div><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Score&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Severity&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EPSS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Percentile&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CWE&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>CTEK&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Chargeportal&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25192" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25192</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>IGL-Technologies&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>eParking.fi&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-29796" target="_blank" rel="noreferrer noopener"><span>CVE-2026-29796</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;" class="zp-selected-cell"><div><div><p><span>9.4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Automated Logic&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>WebCTRL&nbsp;Premium Server&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24060" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24060</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/319.html" target="_blank" rel="noreferrer noopener"><span>CWE-319</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Automated Logic&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>WebCTRL&nbsp;Premium Server&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25086" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25086</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.7&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/605.html" target="_blank" rel="noreferrer noopener"><span>CWE-605</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Automated Logic&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>WebCTRL&nbsp;Premium Server&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32666" target="_blank" rel="noreferrer noopener"><span>CVE-2026-32666</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/290.html" target="_blank" rel="noreferrer noopener"><span>CWE-290</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>CTEK&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Chargeportal&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-31904" target="_blank" rel="noreferrer noopener"><span>CVE-2026-31904</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/307.html" target="_blank" rel="noreferrer noopener"><span>CWE-307</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>IGL-Technologies&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>eParking.fi&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-31903" target="_blank" rel="noreferrer noopener"><span>CVE-2026-31903</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/307.html" target="_blank" rel="noreferrer noopener"><span>CWE-307</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>CTEK&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Chargeportal&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27649" target="_blank" rel="noreferrer noopener"><span>CVE-2026-27649</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/613.html" target="_blank" rel="noreferrer noopener"><span>CWE-613</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>IGL-Technologies&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>eParking.fi&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32663" target="_blank" rel="noreferrer noopener"><span>CVE-2026-32663</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/613.html" target="_blank" rel="noreferrer noopener"><span>CWE-613</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>CTEK&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Chargeportal&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28204" target="_blank" rel="noreferrer noopener"><span>CVE-2026-28204</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>IGL-Technologies&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>eParking.fi&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-31926" target="_blank" rel="noreferrer noopener"><span>CVE-2026-31926</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><br/></span></p><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span>&nbsp;<br/></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" target="_blank" rel="noreferrer noopener">- Bilan des Known Exploited Vulnerabilities du mois de janvier 2025</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener">- Nouveau guide de classification des actifs industriels publié par l'ANSSI</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener">Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div></div><p></p></div><div><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div><p></p></div><div><p></p></div><p></p></div><div><p></p></div><p></p></div><p></p></div><p></p></div><p></p></div><p></p></div><p></p></div></div></div></div></div><div><div><div><div><p></p></div>
</div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 22 Mar 2026 17:16:05 +0100</pubDate></item></channel></rss>