<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.fortress-cybersecurity.fr/blogs/feed" rel="self" type="application/rss+xml"/><title>Site Institutionnel - Blog</title><description>Site Institutionnel - Blog</description><link>https://www.fortress-cybersecurity.fr/blogs</link><lastBuildDate>Fri, 13 Mar 2026 17:44:57 +0100</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S11]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s11</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Cybermenaces dans l’industrie automobile L’article explique que la transformation numérique du secteur automobile (véhicules connectés, systèmes téléma ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div><div><div><div><div><div><div><p style="font-weight:bold;margin-bottom:13.3333px;"><strong><strong>Cybermenaces dans l’industrie automobile</strong></strong></p><div><p><span>L’article explique que la transformation numérique du secteur automobile (véhicules connectés, systèmes télématiques, réseaux de recharge pour véhicules électriques et chaînes d’approvisionnement digitalisées) crée de nouvelles surfaces d’attaque pour les acteurs de la menace. Il montre comment des malwares et ransomwares peuvent perturber non seulement les systèmes IT des constructeurs, mais aussi des éléments critiques comme les mises à jour logicielles des véhicules, les services connectés ou l’écosystème des véhicules électriques. Des risques concrets ont été illustrés : ralentissement des activités d’un concessionnaire à cause d’un malware, vulnérabilités liées aux mises à jour de véhicules connectés ou perturbations dans la chaîne logistique.</span></p></div><a href="https://www.bitsight.com/blog/automotive-cyber-threats-ransomware-malware-trends" title="https://www.bitsight.com/blog/automotive-cyber-threats-ransomware-malware-trends" rel="">https://www.bitsight.com/blog/automotive-cyber-threats-ransomware-malware-trends</a><br></div>
</div></div></div><p></p><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span><span><span><span><span><span><span><span><span><span><strong>Rapport Cisco 2026 l'état de l'IA dans le monde industriel</strong></span></span></span><span></span></span></span></span></span></span></span></span></span></p></div>
<div><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><p style="margin-bottom:13.3333px;"><span><span>L’étude s’appuie sur des données recueillies auprès d’entreprises du monde entier, avec environ 1 000 professionnels de l’industrie interrogés. Elle montre que l’IA occupe désormais une place importante dans des processus critiques, notamment l’automatisation des processus et l’inspection automatisée de la qualité. Environ 70 % des professionnels déclarent avoir déployé de manière mature des solutions d’IA dans ces domaines. Cependant, cette adoption soulève aussi des questions d’exposition aux menaces. Le paradoxe est que, malgré ce niveau de maturité, 40 % des répondants estiment que le principal frein au déploiement reste la cybersécurité.</span></span></p><a href="https://www.cisco.com/c/dam/en/us/solutions/networking/industrial-iot/2026-state-of-industrial-ai-report.pdf" title="https://www.cisco.com/c/dam/en/us/solutions/networking/industrial-iot/2026-state-of-industrial-ai-report.pdf" rel="">https://www.cisco.com/c/dam/en/us/solutions/networking/industrial-iot/2026-state-of-industrial-ai-report.pdf</a><br><p></p><strong><p style="margin-bottom:13.3333px;line-height:2;"></p></strong><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnerability&nbsp;Corner :</span>&nbsp;</p><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div>
<div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:144px;"><div><div><p><span>CVE&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:141.25px;"><div><div><p><span>Vendor&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:202.266px;"><div><div><p><span>Product&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:720.734px;"><div><div><p><span>Liens&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22054" target="_blank" rel="noreferrer noopener"><span>CVE-2021-22054</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:141.25px;"><div><div><p><span>Omnissa&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:202.266px;"><div><div><p><span>Workspace One UEM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:720.734px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22054%2C%20https%3A//web.archive.org/web/20211222154335/https%3A//www.vmware.com/security/advisories/VMSA-2021-0029.html" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2021-22054, https://web.archive.org/web/20211222154335/https://www.vmware.com/security/advisories/VMSA-2021-0029.html</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-26399" target="_blank" rel="noreferrer noopener"><span>CVE-2025-26399</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:141.25px;"><div><div><p><span>SolarWinds&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:202.266px;"><div><div><p><span>Web Help Desk&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:720.734px;"><div><div><p><span></span><a href="https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_12-8-7-hotfix-1_release_notes.htm%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-26399%2C%20https%3A//www.solarwinds.com/trust-center/security-advisories/cve-2025-26399" target="_blank" rel="noreferrer noopener"><span>https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_12-8-7-hotfix-1_release_notes.htm, https://nvd.nist.gov/vuln/detail/CVE-2025-26399, https://www.solarwinds.com/trust-center/security-advisories/cve-2025-26399</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68613" target="_blank" rel="noreferrer noopener"><span>CVE-2025-68613</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:141.25px;"><div><div><p><span>n8n&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:202.266px;"><div><div><p><span>n8n&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:720.734px;"><div><div><p><span></span><a href="https://github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-68613" target="_blank" rel="noreferrer noopener"><span>https://github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp, https://nvd.nist.gov/vuln/detail/CVE-2025-68613</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1603" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1603</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:141.25px;"><div><div><p><span>Ivanti&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:202.266px;"><div><div><p><span>&nbsp;Endpoint Manager (EPM)&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:720.734px;"><div><div><p><span></span><a href="https://hub.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024?language=en_US%2C%20https%3A%2F%2Fnvd.nist.gov%2Fvuln%2Fdetail%2FCVE-2026-1603" target="_blank" rel="noreferrer noopener"><span>https://hub.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024?language=en_US, https://nvd.nist.gov/vuln/detail/CVE-2026-1603</span></a><span>&nbsp;</span></p></div>
</div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div>
<div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Vendor&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>Product&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>Critical&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>High&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>Medium&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>Low&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>Total&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>Heliox Flex 180 kW EV Charging&nbsp;Station,RUGGEDCOM&nbsp;APE1808,SIDIS&nbsp;Prime,SIMATIC&nbsp;Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0)&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>13&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>13&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>29&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Lantronix&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>8&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Trane&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>Tracer SC&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>5&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Apeman&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>ID71&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>3&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Inductive Automation&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>Ignition Software&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Ceragon&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>MultiHaul&nbsp;MH-B100-CCS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Honeywell&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>IQ4E&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p></div>
<div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Vendor&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Product&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVE&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Score&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Severity&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EPSS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Percentile&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CWE&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Honeywell&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>IQ4E&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3611" target="_blank" rel="noreferrer noopener"><span>CVE-2026-3611</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>10.0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Apeman&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ID71&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11126" target="_blank" rel="noreferrer noopener"><span>CVE-2025-11126</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.180%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>39.342%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67038" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67038</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.773%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67039" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67039</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.034%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.739%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/288.html" target="_blank" rel="noreferrer noopener"><span>CWE-288</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>RUGGEDCOM APE1808&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24858" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24858</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.776%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>85.865%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/288.html" target="_blank" rel="noreferrer noopener"><span>CWE-288</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIMATIC Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0)&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40943" target="_blank" rel="noreferrer noopener"><span>CVE-2025-40943</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.6&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.041%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>12.336%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer noopener"><span>CWE-79</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-7783" target="_blank" rel="noreferrer noopener"><span>CVE-2025-7783</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.7&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.177%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>38.929%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/330.html" target="_blank" rel="noreferrer noopener"><span>CWE-330</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-12816" target="_blank" rel="noreferrer noopener"><span>CVE-2025-12816</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.6&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.059%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>18.361%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/436.html" target="_blank" rel="noreferrer noopener"><span>CWE-436</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66035" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66035</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.6&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.075%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>22.465%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/201.html" target="_blank" rel="noreferrer noopener"><span>CWE-201</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Trane&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Tracer SC&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28252" target="_blank" rel="noreferrer noopener"><span>CVE-2026-28252</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/327.html" target="_blank" rel="noreferrer noopener"><span>CWE-327</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66412" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66412</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.039%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>11.354%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer noopener"><span>CWE-79</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22610" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22610</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.014%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.383%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer noopener"><span>CWE-79</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-6965" target="_blank" rel="noreferrer noopener"><span>CVE-2025-6965</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.7&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.072%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>21.786%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/197.html" target="_blank" rel="noreferrer noopener"><span>CWE-197</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-29857" target="_blank" rel="noreferrer noopener"><span>CVE-2024-29857</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.337%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>56.144%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener"><span>CWE-125</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-30172" target="_blank" rel="noreferrer noopener"><span>CVE-2024-30172</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.136%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>33.229%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/20.html" target="_blank" rel="noreferrer noopener"><span>CWE-20</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41996" target="_blank" rel="noreferrer noopener"><span>CVE-2024-41996</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.430%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>62.198%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/295.html" target="_blank" rel="noreferrer noopener"><span>CWE-295</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-15284" target="_blank" rel="noreferrer noopener"><span>CVE-2025-15284</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.193%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>40.993%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/20.html" target="_blank" rel="noreferrer noopener"><span>CWE-20</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58754" target="_blank" rel="noreferrer noopener"><span>CVE-2025-58754</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.102%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>27.909%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/770.html" target="_blank" rel="noreferrer noopener"><span>CWE-770</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64756" target="_blank" rel="noreferrer noopener"><span>CVE-2025-64756</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.038%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>11.294%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66031" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66031</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.115%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>30.056%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/674.html" target="_blank" rel="noreferrer noopener"><span>CWE-674</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Trane&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Tracer SC&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28253" target="_blank" rel="noreferrer noopener"><span>CVE-2026-28253</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/789.html" target="_blank" rel="noreferrer noopener"><span>CWE-789</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67034" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67034</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.773%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67035" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67035</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.773%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67036" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67036</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.773%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67037" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67037</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.773%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67041" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67041</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.044%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>13.196%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Trane&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Tracer SC&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28255" target="_blank" rel="noreferrer noopener"><span>CVE-2026-28255</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.8&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/798.html" target="_blank" rel="noreferrer noopener"><span>CWE-798</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>RUGGEDCOM APE1808&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64157" target="_blank" rel="noreferrer noopener"><span>CVE-2025-64157</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.7&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.826%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/134.html" target="_blank" rel="noreferrer noopener"><span>CWE-134</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-62522" target="_blank" rel="noreferrer noopener"><span>CVE-2025-62522</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.016%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>83.540%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/22.html" target="_blank" rel="noreferrer noopener"><span>CWE-22</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Inductive Automation&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Ignition Software&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13913" target="_blank" rel="noreferrer noopener"><span>CVE-2025-13913</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/502.html" target="_blank" rel="noreferrer noopener"><span>CWE-502</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-30171" target="_blank" rel="noreferrer noopener"><span>CVE-2024-30171</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.9&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.100%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>27.724%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/203.html" target="_blank" rel="noreferrer noopener"><span>CWE-203</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9232" target="_blank" rel="noreferrer noopener"><span>CVE-2025-9232</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.9&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.033%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.182%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener"><span>CWE-125</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>RUGGEDCOM APE1808&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-55018" target="_blank" rel="noreferrer noopener"><span>CVE-2025-55018</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.8&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.053%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>16.404%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/444.html" target="_blank" rel="noreferrer noopener"><span>CWE-444</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Trane&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Tracer SC&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28254" target="_blank" rel="noreferrer noopener"><span>CVE-2026-28254</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.8&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer noopener"><span>CWE-862</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Trane&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Tracer SC&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28256" target="_blank" rel="noreferrer noopener"><span>CVE-2026-28256</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.8&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/547.html" target="_blank" rel="noreferrer noopener"><span>CWE-547</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9230" target="_blank" rel="noreferrer noopener"><span>CVE-2025-9230</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.6&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.031%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.655%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/787.html" target="_blank" rel="noreferrer noopener"><span>CWE-787</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Apeman&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ID71&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11852" target="_blank" rel="noreferrer noopener"><span>CVE-2025-11852</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.073%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>22.012%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Ceragon&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MultiHaul&nbsp;MH-B100-CCS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-57176" target="_blank" rel="noreferrer noopener"><span>CVE-2025-57176</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.663%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>70.878%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/434.html" target="_blank" rel="noreferrer noopener"><span>CWE-434</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64718" target="_blank" rel="noreferrer noopener"><span>CVE-2025-64718</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.020%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.992%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/1321.html" target="_blank" rel="noreferrer noopener"><span>CWE-1321</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66030" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66030</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.042%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>12.433%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/190.html" target="_blank" rel="noreferrer noopener"><span>CWE-190</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9670" target="_blank" rel="noreferrer noopener"><span>CVE-2025-9670</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.051%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>15.546%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/1333.html" target="_blank" rel="noreferrer noopener"><span>CWE-1333</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-69277" target="_blank" rel="noreferrer noopener"><span>CVE-2025-69277</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.007%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.597%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/184.html" target="_blank" rel="noreferrer noopener"><span>CWE-184</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58751" target="_blank" rel="noreferrer noopener"><span>CVE-2025-58751</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.421%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>80.382%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/22.html" target="_blank" rel="noreferrer noopener"><span>CWE-22</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58752" target="_blank" rel="noreferrer noopener"><span>CVE-2025-58752</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.016%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.513%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/23.html" target="_blank" rel="noreferrer noopener"><span>CWE-23</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>RUGGEDCOM APE1808&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-62439" target="_blank" rel="noreferrer noopener"><span>CVE-2025-62439</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.901%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/940.html" target="_blank" rel="noreferrer noopener"><span>CWE-940</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Apeman&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ID71&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11851" target="_blank" rel="noreferrer noopener"><span>CVE-2025-11851</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.052%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>16.124%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer noopener"><span>CWE-79</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-70082" target="_blank" rel="noreferrer noopener"><span>CVE-2025-70082</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.7&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.066%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>20.274%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/620.html" target="_blank" rel="noreferrer noopener"><span>CWE-620</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Heliox Flex 180 kW EV Charging Station&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-27769" target="_blank" rel="noreferrer noopener"><span>CVE-2025-27769</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.6&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.014%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.550%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/923.html" target="_blank" rel="noreferrer noopener"><span>CWE-923</span></a><span>&nbsp;</span></p></div>
</div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br> &nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de janvier 2025</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
</div><br><p></p></div><div><p></p></div><p></p></div><div><p></p></div><p></p></div>
<p></p></div><p></p></div><p></p></div><p></p></div><p></p></div></div></div></div>
</div><div><div><div><div><p></p></div></div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div>]]></content:encoded><pubDate>Fri, 13 Mar 2026 15:48:19 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S10]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s10</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>0.000 Les paiements liés aux ransomwares diminuent Les chercheurs en cybersécurité ont observés une augmentation de 50% du nombre de victimes de ransomw ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><span>0.000</span><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span></span></span></span></span><div><div><div><p style="margin-bottom:13.3333px;"></p><div><div><div><p style="font-weight:bold;margin-bottom:13.3333px;"><strong>Les paiements liés aux ransomwares diminuent</strong></p><div><p>Les chercheurs en cybersécurité ont observés une augmentation de 50% du nombre de victimes de ransomware. Pourtant les paiements liés aux ransomwares diminuent de 8%. L'article explique que les entreprises refusent de plus en plus de payer, grâce à de meilleures stratégies de réponse et de surveillance, une pression accrue des autorités contre les opérateurs de ransomware, les infrastructures et des faiblesses cryptographique qui permet au victime de décrypter les données comme avec le ransomware VolkLocker.</p></div><a href="https://www.infosecurity-magazine.com/news/ransomware-payments-decline-1/" title="https://www.infosecurity-magazine.com/news/ransomware-payments-decline-1/" rel="">https://www.infosecurity-magazine.com/news/ransomware-payments-decline-1/</a><br></div>
</div></div><p></p><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span><span><span><span><span><span><span><span>Cybermenaces dans l’industrie pharmaceutique</span><span></span></span></span></span></span></span></span></span></span></p></div>
<div><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><p style="margin-bottom:13.3333px;">L’industrie pharmaceutique est une cible privilégiée des cyberattaques en raison de la valeur élevée de sa propriété intellectuelle et des données de santé sensibles qu’elle détient. Elle est exposée à plusieurs risques, comme le vol de données, les attaques de la chaîne d’approvisionnement, les erreurs humaines ou encore les vulnérabilités liées aux systèmes anciens et aux environnements cloud complexes.</p><a href="https://www.hornetsecurity.com/en/blog/cyber-threats-to-pharmaceutical-industry/" title="https://www.hornetsecurity.com/en/blog/cyber-threats-to-pharmaceutical-industry/" rel="">https://www.hornetsecurity.com/en/blog/cyber-threats-to-pharmaceutical-industry/</a><p></p><strong><p style="margin-bottom:13.3333px;line-height:2;"></p></strong><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnerability&nbsp;Corner :</span>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div>
<div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:152px;"><div><div><p><span>CVE&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Vendor&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>Product&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span>Liens&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:152px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-7921" target="_blank" rel="noreferrer noopener"><span>CVE-2017-7921</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Hikvision&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>Multiple Products&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-7921%2C%20https%3A//www.hikvision.com/us-en/support/document-center/special-notices/privilege-escalating-vulnerability-in-certain-hikvision-ip-cameras/" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2017-7921, https://www.hikvision.com/us-en/support/document-center/special-notices/privilege-escalating-vulnerability-in-certain-hikvision-ip-cameras/</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:152px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22681" target="_blank" rel="noreferrer noopener"><span>CVE-2021-22681</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Rockwell&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>Multiple Products&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22681%2C%20https%3A//support.rockwellautomation.com/app/answers/answer_view/a_id/1130301/%7E/cve-2021-22681%3A-authentication-bypass-vulnerability-found-in-logix-controllers-%2C%20https%3A//www.cisa.gov/news-events/ics-advisories/icsa-21-056-03" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2021-22681, https://support.rockwellautomation.com/app/answers/answer_view/a_id/1130301/~/cve-2021-22681%3A-authentication-bypass-vulnerability-found-in-logix-controllers-, https://www.cisa.gov/news-events/ics-advisories/icsa-21-056-03</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:152px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-30952" target="_blank" rel="noreferrer noopener"><span>CVE-2021-30952</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Apple&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>Multiple Products&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-30952%2C%20https%3A//support.apple.com/en-us/HT212975%2C%20https%3A//support.apple.com/en-us/HT212976%2C%20https%3A//support.apple.com/en-us/HT212978%2C%20https%3A//support.apple.com/en-us/HT212980%2C%20https%3A//support.apple.com/en-us/HT212982" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2021-30952, https://support.apple.com/en-us/HT212975, https://support.apple.com/en-us/HT212976, https://support.apple.com/en-us/HT212978, https://support.apple.com/en-us/HT212980, https://support.apple.com/en-us/HT212982</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:152px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-41974" target="_blank" rel="noreferrer noopener"><span>CVE-2023-41974</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Apple&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>iOS and iPadOS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-41974%2C%20https%3A//support.apple.com/en-us/HT213938%2C%20https%3A//support.apple.com/kb/HT213938" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2023-41974, https://support.apple.com/en-us/HT213938, https://support.apple.com/kb/HT213938</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:152px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-43000" target="_blank" rel="noreferrer noopener"><span>CVE-2023-43000</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Apple&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>Multiple Products&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-43000%2C%20https%3A//support.apple.com/en-us/120324%2C%20https%3A//support.apple.com/en-us/120331%2C%20https%3A//support.apple.com/en-us/120338" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2023-43000, https://support.apple.com/en-us/120324, https://support.apple.com/en-us/120331, https://support.apple.com/en-us/120338</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:152px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21385" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21385</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Qualcomm&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>Multiple Chipsets&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21385%2C%20https%3A//source.android.com/docs/security/bulletin/2026/2026-03-01" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2026-21385, https://source.android.com/docs/security/bulletin/2026/2026-03-01</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:152px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22719" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22719</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Broadcom&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>VMware Aria Operations&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span></span><a href="https://knowledge.broadcom.com/external/article/430349%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-22719%2C%20https%3A//support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947" target="_blank" rel="noreferrer noopener"><span>https://knowledge.broadcom.com/external/article/430349, https://nvd.nist.gov/vuln/detail/CVE-2026-22719, https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947</span></a><span>&nbsp;</span></p></div>
</div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"></p><table border="1"><tbody><tr><td style="vertical-align:top;width:216px;"><p><strong>Vendor&nbsp;</strong></p></td><td style="vertical-align:top;width:522px;"><p><strong>Product&nbsp;</strong></p></td><td style="vertical-align:top;width:125.547px;"><p><strong>Critical&nbsp;</strong></p></td><td style="vertical-align:top;width:110.422px;"><p><strong>High&nbsp;</strong></p></td><td style="vertical-align:top;width:120.938px;"><p><strong>Medium&nbsp;</strong></p></td><td style="vertical-align:top;width:131px;"><p><strong>Low&nbsp;</strong></p></td><td style="vertical-align:top;width:91px;"><p><strong>Total&nbsp;</strong></p></td></tr><tr><td style="width:216px;"> <span>Mobiliti</span></td><td style="width:522px;"> <span>Mobiliti e-mobi.hu</span></td><td style="width:125.547px;"> 1</td><td style="width:110.422px;">2</td><td style="width:120.938px;">1</td><td style="width:131px;">0</td><td style="width:91px;">4</td></tr><tr><td style="width:216px;"> <span> Everon</span></td><td style="width:522px;"> <span><span> Everon OCPP Backends</span></span></td><td style="width:125.547px;"> 1</td><td style="width:110.422px;">2</td><td style="width:120.938px;">1</td><td style="width:131px;">0</td><td style="width:91px;">4</td></tr><tr><td style="width:216px;"><span><span>ePower</span></span></td><td style="width:522px;"><span>ePower epower.ie</span></td><td style="width:125.547px;">1</td><td style="width:110.422px;">2</td><td style="width:120.938px;">1</td><td style="width:131px;">0</td><td style="width:91px;">4</td></tr><tr><td style="width:216px;"> <span><span>Labkotec</span></span></td><td style="width:522px;"> <span>Labkotec LID-3300IP</span></td><td style="width:125.547px;"> 1</td><td style="width:110.422px;">0</td><td style="width:120.938px;">0</td><td style="width:131px;">0</td><td style="width:91px;">1</td></tr><tr><td style="width:216px;"> <span>Hitachi Energy</span></td><td style="width:522px;"> <span> RTU500 series CMU Firmware version 12.7.1 through 12.7.7, RTU500 series CMU Firmware version 13.5.1 through 13.5.4, RTU500 series CMU Firmware version 13.6.1 through 13.6.2, RTU500 series CMU Firmware version 13.7.1 through 13.7.7, RTU500 series CMU Firmware version 13.8.1</span></td><td style="width:125.547px;">0</td><td style="width:110.422px;">3</td><td style="width:120.938px;">1</td><td style="width:131px;"> 0</td><td style="width:91px;"> 4</td></tr><tr><td style="width:216px;"> <span><span>Mitsubishi Electric</span></span></td><td style="width:522px;"><span><span>Mitsubishi Electric MELSEC iQ-F Series EtherNet/IP module and Ethernet module</span></span> </td><td style="width:125.547px;"> 0</td><td style="width:110.422px;">3</td><td style="width:120.938px;">0</td><td style="width:131px;">0</td><td style="width:91px;">1</td></tr><tr><td style="width:216px;"> <span>Portwell</span></td><td style="width:522px;"> <span><span> Portwell Engineering Toolkits</span></span></td><td style="width:125.547px;"> 0</td><td style="width:110.422px;">1</td><td style="width:120.938px;">0</td><td style="width:131px;">0</td><td style="width:91px;">1</td></tr><tr><td style="width:216px;"><span>Delta Electronics</span></td><td style="width:522px;"> <span>Delta Electronics CNCSoft-G2</span></td><td style="width:125.547px;"> 0</td><td style="width:110.422px;">1</td><td style="width:120.938px;">0</td><td style="width:131px;">0</td><td style="width:91px;">1</td></tr><tr><td style="vertical-align:top;width:216px;"><p>Delta Electronics&nbsp;</p></td><td style="vertical-align:top;width:522px;"><p>EVMAPA&nbsp;</p></td><td style="vertical-align:top;width:125.547px;"><p>0</p></td><td style="vertical-align:top;width:110.422px;"><p>1</p></td><td style="vertical-align:top;width:120.938px;"><p>0&nbsp;</p></td><td style="vertical-align:top;width:131px;"><p>0&nbsp;</p></td><td style="vertical-align:top;width:91px;"><p>1</p></td></tr><tr><td style="vertical-align:top;width:216px;"><p><span><span> Hitachi Energy</span></span><br></p></td><td style="vertical-align:top;width:522px;"><span><span>CVE-2026-2460</span></span><br></td><td style="vertical-align:top;width:125.547px;">0</td><td style="vertical-align:top;width:110.422px;">0</td><td style="vertical-align:top;width:120.938px;">2</td><td style="vertical-align:top;width:131px;">0</td><td style="vertical-align:top;width:91px;">2</td></tr></tbody></table><p></p></div>
<div><p style="margin-bottom:13.3333px;"><br></p><p style="margin-bottom:13.3333px;">Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;"><span></span></p><div><table border="1"><tbody><tr><td style="vertical-align:top;width:174px;"><p><strong>Vendor&nbsp;</strong></p></td><td style="vertical-align:top;width:476px;"><p><strong>Product&nbsp;</strong></p></td><td style="vertical-align:top;width:159.094px;"><p><strong>CVE&nbsp;</strong></p></td><td style="vertical-align:top;width:98.3594px;"><p><strong>CVSSv3 Score&nbsp;</strong></p></td><td style="vertical-align:top;width:99.9375px;"><p><strong>CVSSv3 Severity&nbsp;</strong></p></td><td style="vertical-align:top;width:99.8125px;"><p><strong>EPSS&nbsp;</strong></p></td><td style="vertical-align:top;width:105.297px;"><p><strong>Percentile&nbsp;</strong></p></td><td style="vertical-align:top;width:100.328px;"><p><strong>CWE&nbsp;</strong></p></td></tr><tr><td style="vertical-align:top;width:174px;"><p>Delta Electronics&nbsp;</p></td><td style="vertical-align:top;width:476px;"><p>EVMAPA&nbsp;</p></td><td style="vertical-align:top;width:159.094px;"><p>CVE-2026-3094<br></p></td><td style="vertical-align:top;width:98.3594px;"><p>7.8</p></td><td style="vertical-align:top;width:99.9375px;"><p>HIGH&nbsp;</p></td><td style="vertical-align:top;width:99.8125px;"><p>0.0</p></td><td style="vertical-align:top;width:105.297px;"><p></p><div><pre>0.029</pre></div>
<p></p></td><td style="vertical-align:top;width:100.328px;"><p>CWE-787<br></p></td></tr><tr><td style="vertical-align:top;width:174px;"><p>Mitsubishi Electric<br></p></td><td style="vertical-align:top;width:476px;">Mitsubishi Electric MELSEC iQ-F Series EtherNet/IP module and Ethernet module</td><td style="vertical-align:top;width:159.094px;"><div> CVE-2026-1874 </div></td><td style="vertical-align:top;width:98.3594px;">7.5</td><td style="vertical-align:top;width:99.9375px;">HIGH</td><td style="vertical-align:top;width:99.8125px;">0.001 </td><td style="vertical-align:top;width:105.297px;"> 0.338</td><td style="vertical-align:top;width:100.328px;">CWE-670</td></tr><tr><td style="width:174px;">Mitsubishi Electric </td><td style="width:476px;"> Mitsubishi Electric MELSEC iQ-F Series EtherNet/IP module and Ethernet module</td><td style="width:159.094px;"> CVE-2026-1875</td><td style="width:98.3594px;"> 7.5</td><td style="width:99.9375px;"> HIGH</td><td style="width:99.8125px;">0.001<br></td><td style="width:105.297px;">0.338<br></td><td style="width:100.328px;">CWE-404 </td></tr><tr><td style="width:174px;"> Mitsubishi Electric</td><td style="width:476px;"> Mitsubishi Electric MELSEC iQ-F Series EtherNet/IP module and Ethernet module</td><td style="width:159.094px;"> CVE-2026-1876</td><td style="width:98.3594px;"> 7.5</td><td style="width:99.9375px;"> HIGH</td><td style="width:99.8125px;"><span><span>0.001</span></span> </td><td style="width:105.297px;"> <span><span>0.338</span></span></td><td style="width:100.328px;">CWE-404  </td></tr><tr><td style="width:174px;"> <span>Hitachi Energy</span></td><td style="width:476px;"> <span>Hitachi Energy Relion REB500 Product</span></td><td style="width:159.094px;"> <span>CVE-2026-2459</span></td><td style="width:98.3594px;"> <span><span>6.5</span></span></td><td style="width:99.9375px;"> Medium</td><td style="width:99.8125px;"> <span>0.000</span></td><td style="width:105.297px;"> <span>0.0845</span></td><td style="width:100.328px;"> <span>CWE-267</span></td></tr><tr><td style="width:174px;"> <span>Hitachi Energy</span></td><td style="width:476px;"> <span>Hitachi Energy Relion REB500 Product</span></td><td style="width:159.094px;"> <span>CVE-2026-2460</span></td><td style="width:98.3594px;"> <span><span>6.5</span></span></td><td style="width:99.9375px;"> <span><span>Medium</span></span></td><td style="width:99.8125px;"> <span>0.000</span></td><td style="width:105.297px;"> <span>0.0845</span></td><td style="width:100.328px;"> <span>CWE-267</span></td></tr><tr><td style="width:174px;"> <span><span>Hitachi Energy</span></span></td><td style="width:476px;"> <span><span>RTU500 series CMU Firmware version 12.7.1 through 12.7.7, RTU500 series CMU Firmware version 13.5.1 through 13.5.4, RTU500 series CMU Firmware version 13.6.1 through 13.6.2, RTU500 series CMU Firmware version 13.7.1 through 13.7.7, RTU500 series CMU Firmware version 13.8.1</span></span></td><td style="width:159.094px;"><div><div> CVE-2026-1772 </div>
</div></td><td style="width:98.3594px;"> <span><span>4.3</span></span></td><td style="width:99.9375px;"> <span><span>Medium</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span>0.155</span></td><td style="width:100.328px;"> <span>&nbsp;CWE-280</span></td></tr><tr><td style="width:174px;"> <span><span>Hitachi Energy</span></span></td><td style="width:476px;"> <span>RTU500 series CMU Firmware version 12.7.1 through 12.7.7, RTU500 series CMU Firmware version 13.5.1 through 13.5.4, RTU500 series CMU Firmware version 13.6.1 through 13.6.2, RTU500 series CMU Firmware version 13.7.1 through 13.7.7, RTU500 series CMU Firmware version 13.8.1</span></td><td style="width:159.094px;"><div><div> CVE-2026-1773 </div>
</div></td><td style="width:98.3594px;">7.5 </td><td style="width:99.9375px;"> High</td><td style="width:99.8125px;"><span><span> 0.000</span></span> </td><td style="width:105.297px;"> <span>0.219</span></td><td style="width:100.328px;"><span>CWE-184</span> </td></tr><tr><td style="width:174px;"> <span><span>Hitachi Energy</span></span></td><td style="width:476px;"> <span>RTU500 series CMU Firmware version 12.7.1 through 12.7.7, RTU500 series CMU Firmware version 13.5.1 through 13.5.4, RTU500 series CMU Firmware version 13.6.1 through 13.6.2, RTU500 series CMU Firmware version 13.7.1 through 13.7.7, RTU500 series CMU Firmware version 13.8.1</span></td><td style="width:159.094px;"><div><div><span style="font-family:inherit;font-size:inherit;">CVE-2024-8176</span></div>
</div></td><td style="width:98.3594px;"> <span><span>7.5</span></span></td><td style="width:99.9375px;"><span><span>High</span></span> </td><td style="width:99.8125px;"> <span><span> <span>0.004</span></span></span></td><td style="width:105.297px;"> <span>0.613</span></td><td style="width:100.328px;"> <span>CWE-674</span></td></tr><tr><td style="width:174px;"> <span><span>Hitachi Energy</span></span></td><td style="width:476px;"> <span>RTU500 series CMU Firmware version 12.7.1 through 12.7.7, RTU500 series CMU Firmware version 13.5.1 through 13.5.4, RTU500 series CMU Firmware version 13.6.1 through 13.6.2, RTU500 series CMU Firmware version 13.7.1 through 13.7.7, RTU500 series CMU Firmware version 13.8.1</span></td><td style="width:159.094px;"> CVE-2025-59375</td><td style="width:98.3594px;"><span><span>7.5</span></span> </td><td style="width:99.9375px;"> <span><span>High</span></span></td><td style="width:99.8125px;"><span><span> 0.000</span></span> </td><td style="width:105.297px;"> <span>0.155</span></td><td style="width:100.328px;"> <span>CWE-770</span></td></tr><tr><td style="width:174px;"> <span>Portwell</span></td><td style="width:476px;"> <span>Portwell Engineering Toolkits</span></td><td style="width:159.094px;"> <span>CVE-2026-3437</span></td><td style="width:98.3594px;">8.8</td><td style="width:99.9375px;">High</td><td style="width:99.8125px;"> <span><span> 0.000 </span></span></td><td style="width:105.297px;"> <span>0.0258</span></td><td style="width:100.328px;"> <span>CWE-119</span></td></tr><tr><td style="width:174px;"> <span>Labkotec</span></td><td style="width:476px;"> <span>Labkotec LID-3300IP</span></td><td style="width:159.094px;"> <span>CVE-2026-1775</span></td><td style="width:98.3594px;"> <span>9.4</span></td><td style="width:99.9375px;"> Critical</td><td style="width:99.8125px;"> <span><span>  0.000</span></span></td><td style="width:105.297px;"><span>0.026</span> </td><td style="width:100.328px;"> <span>CWE-306</span></td></tr><tr><td style="width:174px;"> <span>Mobiliti</span></td><td style="width:476px;"> <span>Mobiliti e-mobi.hu</span></td><td style="width:159.094px;"><div><div> CVE-2026-26051 </div>
</div></td><td style="width:98.3594px;"> <span>9.4</span></td><td style="width:99.9375px;"> <span>Critical</span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span>0.275</span></td><td style="width:100.328px;"><span>&nbsp;<span><span> CWE-306</span></span></span></td></tr><tr style="height:46.3281px;"><td style="width:174px;"> <span><span>Mobiliti</span></span></td><td style="width:476px;"> <span><span>Mobiliti e-mobi.hu</span></span></td><td style="width:159.094px;"> CVE-2026-20882 <div><div></div>
</div></td><td style="width:98.3594px;"> 7.5</td><td style="width:99.9375px;">High</td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span>0.176</span></td><td style="width:100.328px;"> <span><span> CWE-307</span></span></td></tr><tr><td style="width:174px;"> <span><span>Mobiliti</span></span></td><td style="width:476px;"> <span><span>Mobiliti e-mobi.hu</span></span></td><td style="width:159.094px;"> CVE-2026-27764</td><td style="width:98.3594px;"> 7.3</td><td style="width:99.9375px;"> <span><span>High</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span>0.102</span></td><td style="width:100.328px;"> <span> CWE-613</span></td></tr><tr><td style="width:174px;"> <span><span>Mobiliti</span></span></td><td style="width:476px;"> <span><span>Mobiliti e-mobi.hu</span></span></td><td style="width:159.094px;"><div><div><span style="font-family:inherit;font-size:inherit;">CVE-2026-27777</span></div>
</div></td><td style="width:98.3594px;"> 6.5</td><td style="width:99.9375px;">Medium</td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span>0.128</span></td><td style="width:100.328px;"> <span>CWE-522</span></td></tr><tr><td style="width:174px;"><span>ePower</span></td><td style="width:476px;"> <span>ePower epower.ie</span></td><td style="width:159.094px;"> CVE-2026-22552</td><td style="width:98.3594px;"> <span><span> 9.4</span></span></td><td style="width:99.9375px;"> <span><span>Critical</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span> 0.275</span></span></td><td style="width:100.328px;"> <span>CWE-306</span></td></tr><tr><td style="width:174px;"> <span>ePower</span></td><td style="width:476px;"> <span>ePower epower.ie</span></td><td style="width:159.094px;"><div><div><span style="font-family:inherit;font-size:inherit;">CVE-2026-27778</span></div>
</div></td><td style="width:98.3594px;"> <span>7.5</span></td><td style="width:99.9375px;"> <span><span>High</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span>0.176</span></span></td><td style="width:100.328px;"> <span>CWE-307</span></td></tr><tr><td style="width:174px;"> <span>ePower</span></td><td style="width:476px;"> <span>ePower epower.ie</span><span>ePower epower.ie</span></td><td style="width:159.094px;"><div><div><span style="font-family:inherit;font-size:inherit;">CVE-2026-24912</span></div>
</div></td><td style="width:98.3594px;"> <span><span>7.3</span></span></td><td style="width:99.9375px;"> <span><span>High</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span>0.102</span></span></td><td style="width:100.328px;"> <span>CWE-613</span></td></tr><tr><td style="width:174px;"> <span>ePower</span></td><td style="width:476px;"> <span>ePower epower.ie</span></td><td style="width:159.094px;"> CVE-2026-27770</td><td style="width:98.3594px;"> <span>6.5</span></td><td style="width:99.9375px;"> <span>Medium</span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span>0.128</span></span></td><td style="width:100.328px;"> <span><span> CWE-522</span></span></td></tr><tr><td style="width:174px;"> <span><span>Everon</span></span></td><td style="width:476px;"> <span><span>Everon OCPP Backends</span></span></td><td style="width:159.094px;"> CVE-2026-26288</td><td style="width:98.3594px;"> <span><span>9.4</span></span></td><td style="width:99.9375px;"> <span><span>Critical</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span>0.275</span></span></td><td style="width:100.328px;"> <span><span>CWE-306</span></span></td></tr><tr><td style="width:174px;"> <span><span>Everon</span></span></td><td style="width:476px;"> <span><span>Everon OCPP Backends</span></span></td><td style="width:159.094px;"> CVE-2026-24696 <div></div></td><td style="width:98.3594px;"> <span><span>7.5</span></span></td><td style="width:99.9375px;"> <span><span>High</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span>0.176</span></span></td><td style="width:100.328px;"> <span><span> CWE-307</span></span></td></tr><tr style="height:60.3281px;"><td style="width:174px;"> <span><span>Everon</span></span></td><td style="width:476px;"> <span><span>Everon OCPP Backends</span></span></td><td style="width:159.094px;"> CVE-2026-20748 <div></div></td><td style="width:98.3594px;"> <span><span>7.5</span></span></td><td style="width:99.9375px;"> <span><span>High</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span>0.102</span></span></td><td style="width:100.328px;"> <span><span> CWE-613</span></span></td></tr><tr><td style="width:174px;"> <span><span>Everon</span></span></td><td style="width:476px;"> <span><span>Everon OCPP Backends</span></span></td><td style="width:159.094px;"><div><div><span style="font-family:inherit;font-size:inherit;">CVE-2026-27027</span></div>
</div></td><td style="width:98.3594px;"> <span><span>6.5</span></span></td><td style="width:99.9375px;"> <span><span>Medium</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span>0.128</span></span></td><td style="width:100.328px;"><span><span> CWE-522</span></span> </td></tr><tr><td style="width:174px;"><span>Delta Electronics</span></td><td style="width:476px;"> <span>Delta Electronics CNCSoft-G2</span></td><td style="width:159.094px;"> <span>CVE-2026-3094</span></td><td style="width:98.3594px;"> 7.8</td><td style="width:99.9375px;">High</td><td style="width:99.8125px;" class="zp-selected-cell"> <span> 0.000</span></td><td style="width:105.297px;"> <span>0.029</span></td><td style="width:100.328px;"> <span>CWE-787</span></td></tr></tbody></table></div>
<p></p></div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br> &nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de décembre 2025</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;">- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
</div><br><p></p></div><p></p></div><p></p></div><p></p></div><p></p></div><p></p></div>
<p></p></div></div></div></div></div><div><div><div><div><p></p></div></div><p></p></div>
<div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div>]]></content:encoded><pubDate>Mon, 09 Mar 2026 09:55:59 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S9]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s9</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>CrowdStrike 2026 Global Threat Report : les cyberattaques sont de plus en plus rapides Le rapport 2026 de CrowdStrike montre qu’en 2025, les attaquants ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span></span></span></span></span><div><div><div><p style="margin-bottom:13.3333px;"></p><div><div><p style="font-weight:bold;margin-bottom:13.3333px;">CrowdStrike 2026 Global Threat Report : les cyberattaques sont de plus en plus rapides</p><div><p>Le rapport 2026 de CrowdStrike montre qu’en 2025, les attaquants sont devenus plus rapides, plus discrets et très assistés par l’IA. Le temps moyen entre l’accès initial et le mouvement latéral est tombé à 29 minutes, avec un record de 27 secondes. Les acteurs de la menace utilisent l’IA pour accélérer le phishing, l’ingénierie sociale et l’automatisation des attaques (+89% d’activité malveillante liée à l’IA). Ils ciblent aussi les systèmes d’IA d’entreprise via des injections malveillantes et l’exploitation de vulnérabilités. 82% des détections sont désormais sans malware : les attaquants abusent d’identifiants valides, de flux d’identité de confiance et d’intégrations SaaS légitimes. Les attaques supply chain, l’exploitation de zero-days (+42%) et la compromission d’équipements réseau (VPN, firewalls) marquent une forte hausse, notamment chez les acteurs liés à la Chine et à la Corée du Nord.</p></div><a href="https://www.crowdstrike.com/en-us/blog/crowdstrike-2026-global-threat-report-findings/" title="https://www.crowdstrike.com/en-us/blog/crowdstrike-2026-global-threat-report-findings/" rel="">https://www.crowdstrike.com/en-us/blog/crowdstrike-2026-global-threat-report-findings/</a><br></div>
</div><p></p><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span><span><span><span><span><span><span>Rapport VulnCheck 2026 :&nbsp;<span>1 % des vulnérabilités divulguées ont été exploitées</span></span></span></span></span></span></span></span></span></p></div>
<div><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><p style="margin-bottom:13.3333px;">Le rapport revient sur les vulnérabilités qui ont été les plus utiles aux acteurs de la menace cyber. En 2025, à peine 1 % des vulnérabilités divulguées ont été exploitées sur 48 000 nouvelles CVEs. Il indique également que les POC pour les nouvelles CVE ont augmenté de 16,5 % en 2025, inondant les organisations de signaux « de risque » qui se sont souvent révélés être des fausses alertes ou des informations trompeuses générées par l'IA.</p><a href="https://wwv.vulncheck.com/2026-vulncheck-exploit-intelligence-report" title="https://wwv.vulncheck.com/2026-vulncheck-exploit-intelligence-report" rel="">https://wwv.vulncheck.com/2026-vulncheck-exploit-intelligence-report</a><br><div><div><div><div><strong>Rapport sur les cybermenaces : la vulnérabilité croissante du secteur automobile</strong><br></div>
<div> Dans ce rapport Upstream (société de cybersécurité), analyse l'évolution cyber-risques dans l'automobile et la mobilité intelligente, en mettant l'accent sur l'escalade des ransomwares qui ciblent les systèmes industriels (OT) et perturbent la production. Il souligne comment la convergence entre l'IT et l'OT, accélérée par l'intelligence artificielle et l'essor des véhicules définis par logiciel, élargit la surface d'attaque. Le document détaille ainsi la vulnérabilité globale des chaînes d'approvisionnement face à des attaques qui frappent désormais simultanément le cloud, les API et les systèmes physiques des véhicules. <br></div><a href="https://info.upstream.auto/hubfs/Security_Report/Security_Report_2026/Upstream_2026_Global_Automotive_Cybersecurity_Report.pdf" title="https://info.upstream.auto/hubfs/Security_Report/Security_Report_2026/Upstream_2026_Global_Automoti…" rel="">https://info.upstream.auto/hubfs/Security_Report/Security_Report_2026/Upstream_2026_Global_Automoti…</a><br></div>
</div></div><p></p><strong><p style="margin-bottom:13.3333px;line-height:2;"></p></strong><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnerability&nbsp;Corner :</span>&nbsp;</p></div>
</div><div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div>
<div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:179px;"><div><div><p><span>CVE&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:146.641px;"><div><div><p><span>Vendor&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:227.391px;"><div><div><p><span>Product&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:761.609px;"><div><div><p><span>Liens&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:179px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20775" target="_blank" rel="noreferrer noopener"><span>CVE-2022-20775</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:146.641px;"><div><div><p><span>Cisco&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:227.391px;"><div><div><p><span>SD-WAN&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:761.609px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20775%2C%20https%3A//www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems%2C%20https%3A//www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems%2C%20https%3A//www.cisco.com/c/en/us/support/docs/csa/cisco-sa-sd-wan-priv-E6e8tEdF.html" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2022-20775, https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems, https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems, https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-sd-wan-priv-E6e8tEdF.html</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:179px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20127" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20127</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:146.641px;"><div><div><p><span>Cisco&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:227.391px;"><div><div><p><span>Catalyst SD-WAN Controller and Manager&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:761.609px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20127%2C%20https%3A//sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk%2C%20https%3A//www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems%2C%20https%3A//www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2026-20127, https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk, https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems, https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:179px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25108" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25108</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:146.641px;"><div><div><p><span>Soliton Systems K.K&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:227.391px;"><div><div><p><span>FileZen&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:761.609px;"><div><div><p><span></span><a href="https://jvn.jp/en/jp/JVN84622767/%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-25108" target="_blank" rel="noreferrer noopener"><span>https://jvn.jp/en/jp/JVN84622767/, https://nvd.nist.gov/vuln/detail/CVE-2026-25108</span></a><span>&nbsp;</span></p></div>
</div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div>
<div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>Vendor&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>Product&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>Critical&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>High&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>Medium&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>Low&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>Total&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>Copeland&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>19&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>23&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>Vnet/IP Interface Package for CENTUM VP R6 (VP6C3300)&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>6&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>6&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>Johnson Controls, Inc.&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>Frick Controls Quantum HD&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>4&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>6&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>EV Energy&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>ev.energy&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>4&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>Gardyn&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>Home Kit Firmware&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>4&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>Mobility46&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>mobility46.se&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>4&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>Chargemap&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>chargemap.com&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>4&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>CloudCharge&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>cloudcharge.se&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>4&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>EV2GO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>ev2go.io&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>4&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>SWITCH EV&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>swtchenergy.com&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>4&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>InSAT&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>MasterSCADA&nbsp;BUK-TS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>2&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>Pelco, Inc.&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>Sarix&nbsp;Professional IMP 3 Series&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p></div>
<div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Vendor&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Product&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVE&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Score&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Severity&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EPSS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Percentile&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CWE&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21718" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21718</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>10.0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/327.html" target="_blank" rel="noreferrer noopener"><span>CWE-327</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>InSAT&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MasterSCADA&nbsp;BUK-TS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21410" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21410</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.163%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>37.216%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/89.html" target="_blank" rel="noreferrer noopener"><span>CWE-89</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>InSAT&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MasterSCADA&nbsp;BUK-TS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22553" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22553</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.424%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>61.749%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Chargemap&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>chargemap.com&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25851" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25851</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.4&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>CloudCharge&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>cloudcharge.se&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20781" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20781</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.4&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EV2GO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ev2go.io&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24731" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24731</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.4&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EV Energy&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ev.energy&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27772" target="_blank" rel="noreferrer noopener"><span>CVE-2026-27772</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.4&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Mobility46&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>mobility46.se&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27028" target="_blank" rel="noreferrer noopener"><span>CVE-2026-27028</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.4&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SWITCH EV&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>swtchenergy.com&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27767" target="_blank" rel="noreferrer noopener"><span>CVE-2026-27767</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.4&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Gardyn&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Home Kit Firmware&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-1242" target="_blank" rel="noreferrer noopener"><span>CVE-2025-1242</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.028%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.746%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/798.html" target="_blank" rel="noreferrer noopener"><span>CWE-798</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Gardyn&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Home Kit Firmware&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-29631" target="_blank" rel="noreferrer noopener"><span>CVE-2025-29631</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.258%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>48.915%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Johnson Controls, Inc.&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Frick Controls Quantum HD&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21654" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21654</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Johnson Controls, Inc.&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Frick Controls Quantum HD&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21656" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21656</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/94.html" target="_blank" rel="noreferrer noopener"><span>CWE-94</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Johnson Controls, Inc.&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Frick Controls Quantum HD&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21657" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21657</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/94.html" target="_blank" rel="noreferrer noopener"><span>CWE-94</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Johnson Controls, Inc.&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Frick Controls Quantum HD&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21658" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21658</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/94.html" target="_blank" rel="noreferrer noopener"><span>CWE-94</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24663" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24663</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25085" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25085</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.6&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/394.html" target="_blank" rel="noreferrer noopener"><span>CWE-394</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Gardyn&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Home Kit Firmware&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-29628" target="_blank" rel="noreferrer noopener"><span>CVE-2025-29628</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.016%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.203%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/319.html" target="_blank" rel="noreferrer noopener"><span>CWE-319</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Gardyn&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Home Kit Firmware&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-29629" target="_blank" rel="noreferrer noopener"><span>CVE-2025-29629</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.029%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.068%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/1392.html" target="_blank" rel="noreferrer noopener"><span>CWE-1392</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20742" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20742</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20764" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20764</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20902" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20902</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20910" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20910</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21389" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21389</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23702" target="_blank" rel="noreferrer noopener"><span>CVE-2026-23702</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24452" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24452</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24517" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24517</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24689" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24689</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24695" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24695</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25037" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25037</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25105" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25105</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25109" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25109</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25111" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25111</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25195" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25195</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25196" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25196</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25721" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25721</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3037" target="_blank" rel="noreferrer noopener"><span>CVE-2026-3037</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Chargemap&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>chargemap.com&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20792" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20792</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/307.html" target="_blank" rel="noreferrer noopener"><span>CWE-307</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>CloudCharge&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>cloudcharge.se&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25114" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25114</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/307.html" target="_blank" rel="noreferrer noopener"><span>CWE-307</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EV2GO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ev2go.io&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25945" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25945</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/307.html" target="_blank" rel="noreferrer noopener"><span>CWE-307</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EV Energy&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ev.energy&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24445" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24445</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/307.html" target="_blank" rel="noreferrer noopener"><span>CWE-307</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Johnson Controls, Inc.&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Frick Controls Quantum HD&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21659" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21659</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/23.html" target="_blank" rel="noreferrer noopener"><span>CWE-23</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Mobility46&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>mobility46.se&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-26305" target="_blank" rel="noreferrer noopener"><span>CVE-2026-26305</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/307.html" target="_blank" rel="noreferrer noopener"><span>CWE-307</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Pelco, Inc.&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Sarix&nbsp;Professional IMP 3 Series&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1241" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1241</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/288.html" target="_blank" rel="noreferrer noopener"><span>CWE-288</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SWITCH EV&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>swtchenergy.com&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25113" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25113</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/307.html" target="_blank" rel="noreferrer noopener"><span>CWE-307</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Chargemap&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>chargemap.com&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25711" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25711</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/613.html" target="_blank" rel="noreferrer noopener"><span>CWE-613</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>CloudCharge&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>cloudcharge.se&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27652" target="_blank" rel="noreferrer noopener"><span>CVE-2026-27652</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/613.html" target="_blank" rel="noreferrer noopener"><span>CWE-613</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EV2GO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ev2go.io&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20895" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20895</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/613.html" target="_blank" rel="noreferrer noopener"><span>CWE-613</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EV Energy&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ev.energy&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-26290" target="_blank" rel="noreferrer noopener"><span>CVE-2026-26290</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/613.html" target="_blank" rel="noreferrer noopener"><span>CWE-613</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Mobility46&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>mobility46.se&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27647" target="_blank" rel="noreferrer noopener"><span>CVE-2026-27647</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/613.html" target="_blank" rel="noreferrer noopener"><span>CWE-613</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SWITCH EV&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>swtchenergy.com&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25778" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25778</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/613.html" target="_blank" rel="noreferrer noopener"><span>CWE-613</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Vnet/IP Interface Package for CENTUM VP R6 (VP6C3300)&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-1924" target="_blank" rel="noreferrer noopener"><span>CVE-2025-1924</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.9&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.011%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.207%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/787.html" target="_blank" rel="noreferrer noopener"><span>CWE-787</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Chargemap&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>chargemap.com&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20791" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20791</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>CloudCharge&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>cloudcharge.se&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20733" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20733</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EV2GO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ev2go.io&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22890" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22890</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EV Energy&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ev.energy&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25774" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25774</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Mobility46&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>mobility46.se&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22878" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22878</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SWITCH EV&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>swtchenergy.com&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27773" target="_blank" rel="noreferrer noopener"><span>CVE-2026-27773</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Johnson Controls, Inc.&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Frick Controls Quantum HD&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21660" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21660</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/256.html" target="_blank" rel="noreferrer noopener"><span>CWE-256</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Vnet/IP Interface Package for CENTUM VP R6 (VP6C3300)&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48019" target="_blank" rel="noreferrer noopener"><span>CVE-2025-48019</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.011%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.215%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/617.html" target="_blank" rel="noreferrer noopener"><span>CWE-617</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Vnet/IP Interface Package for CENTUM VP R6 (VP6C3300)&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48020" target="_blank" rel="noreferrer noopener"><span>CVE-2025-48020</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.011%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.215%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/617.html" target="_blank" rel="noreferrer noopener"><span>CWE-617</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Vnet/IP Interface Package for CENTUM VP R6 (VP6C3300)&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48021" target="_blank" rel="noreferrer noopener"><span>CVE-2025-48021</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.011%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.215%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/191.html" target="_blank" rel="noreferrer noopener"><span>CWE-191</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Vnet/IP Interface Package for CENTUM VP R6 (VP6C3300)&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48022" target="_blank" rel="noreferrer noopener"><span>CVE-2025-48022</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.011%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.215%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/130.html" target="_blank" rel="noreferrer noopener"><span>CWE-130</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Vnet/IP Interface Package for CENTUM VP R6 (VP6C3300)&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48023" target="_blank" rel="noreferrer noopener"><span>CVE-2025-48023</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.011%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.215%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/617.html" target="_blank" rel="noreferrer noopener"><span>CWE-617</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20797" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20797</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/121.html" target="_blank" rel="noreferrer noopener"><span>CWE-121</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22877" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22877</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.7&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/22.html" target="_blank" rel="noreferrer noopener"><span>CWE-22</span></a><span>&nbsp;</span></p></div>
</div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br> &nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de décembre 2025</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 5 mars&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;échanges&nbsp;de&nbsp;fichiers&nbsp;entre les zones&nbsp;industrielles&nbsp;et IT, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/7abb2065-6cf1-41bd-956a-9eaaf4655853%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
</div><p></p></div><p></p></div><p></p></div><p></p></div></div></div></div></div>
<div><div><div><div><p></p></div></div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div>]]></content:encoded><pubDate>Sun, 01 Mar 2026 19:02:37 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S8]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s8</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Rapport 2026 de Dragos sur la cybersécurité en environnement OT Dragos met en évidence dans son article que le nombre d’acteurs développant des capacit ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span></span></span></span></span><div><div><div><p style="margin-bottom:13.3333px;"></p><div><p style="font-weight:bold;margin-bottom:13.3333px;"><span style="font-weight:bold;">Rapport 2026 de Dragos sur la cybersécurité en environnement OT</span></p><div><p>Dragos met en évidence dans son article que le nombre d’acteurs développant des capacités spécifiques aux environnements industriels continue de croître. 3 nouveaux groupes visant spécifiquement les installations industrielles ont été identifiés. Également, le rapport met en avant le nouveau mode opératoire de ces groupes qui ne se contentent plus d'obtenir l'accès et d'attendre mais bien d'apprendre le fonctionnement des processus physiques afin de pouvoir les perturber.</p></div><a href="https://www.dragos.com/ot-cybersecurity-year-in-review" rel="">https://www.dragos.com/ot-cybersecurity-year-in-review</a></div>
<p></p><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span><span><span><span><span>Analyse des menaces OT/IoT au second semestre 2025 et stratégies de renforcement de la cybersécurité</span></span></span></span></span></span></p></div>
<div><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><p style="margin-bottom:13.3333px;">Ce rapport publié par Nozomi Networks analyse les tendances de cybersécurité OT et IoT au second semestre 2025, en identifiant les principales techniques d’attaque, les secteurs les plus ciblés et les acteurs de menace. Il dresse un état des lieux des vulnérabilités présentes dans les environnements industriels, souligne les risques liés aux réseaux sans fil et à l’activité des botnets IoT et met en avant l’évolution des malwares.</p><p style="margin-bottom:13.3333px;"><a href="https://fr.nozominetworks.com/ot-iot-cybersecurity-trends-insights-february-2026" title="https://fr.nozominetworks.com/ot-iot-cybersecurity-trends-insights-february-2026" rel="">https://fr.nozominetworks.com/ot-iot-cybersecurity-trends-insights-february-2026</a></p><div><div><strong>Cyberespionnage et sabotage : Les nouvelles menaces contre la base industrielle de la défense</strong><br></div>
<div> Google souligne l'évolution des cybermenaces, qui ciblent l'industrie mondiale de la défense et de l'aérospatiale, notamment à travers les opérations d'espionnage d'acteurs étatiques (tels que la Russie, la Chine, la Corée du Nord et l'Iran). L'article montre la vulnérabilité croissante de la chaîne d'approvisionnement face à la cybercriminalité et à l'hacktivisme, tout en démontrant comment les attaquants contournent la sécurité en ciblant directement le personnel, les processus de recrutement et les périphériques non surveillés. <br></div>
<div><div><a href="https://cloud.google.com/blog/topics/threat-intelligence/threats-to-defense-industrial-base" title="https://cloud.google.com/blog/topics/threat-intelligence/threats-to-defense-industrial-base" rel="">https://cloud.google.com/blog/topics/threat-intelligence/threats-to-defense-industrial-base</a><br></div>
</div><div><div><p><strong>Méthodologie de l'agence européenne de cybersécurité (ENISA) pour les exercices de crise cyber</strong></p><p style="margin-bottom:13.3333px;">L'ENISA met à disposition une méthodologie pour planifier, réaliser et évaluer un exercice de crise cyber. Toutes les étapes sont détaillés dans la méthodologie avec des conseils pour les professionels. L'agence européenne, met également à disposition un ensemble de modèles et de documents permettant aux planificateurs d'organiser des exercices efficaces.</p><a href="https://www.enisa.europa.eu/publications/the-enisa-cybersecurity-exercise-methodology" rel="">https://www.enisa.europa.eu/publications/the-enisa-cybersecurity-exercise-methodology</a></div>
</div><div><div><p style="font-weight:bold;"><strong>Cybermenaces : un risque stratégique en forte hausse</strong></p><p>Le rapport explique que les cyberattaques font aujourd’hui partie des risques les plus sérieux, surtout dans les pays du G7. Les campagnes de désinformation et les attaques contre les infrastructures critiques inquiètent de plus en plus. Globalement, la cyber n’est plus un risque secondaire : elle est désormais vue comme une menace majeure dans un contexte de fortes tensions internationales.<br></p><a href="https://securityconference.org/en/publications/munich-security-report/2026/munich-security-index-2026/" rel="">https://securityconference.org/en/publications/munich-security-report/2026/munich-security-index-2026/</a></div>
</div></div><p></p><strong><p style="margin-bottom:13.3333px;line-height:2;"></p></strong><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnerability&nbsp;Corner :</span>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div>
<div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:163px;"><div><div><p><span>CVE&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:118.297px;"><div><div><p><span>Vendor&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:225.141px;"><div><div><p><span>Product&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:787.859px;"><div><div><p><span>Liens&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:163px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2008-0015" target="_blank" rel="noreferrer noopener"><span>CVE-2008-0015</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:118.297px;"><div><div><p><span>Microsoft&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:225.141px;"><div><div><p><span>Windows&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:787.859px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2008-0015%2C%20https%3A//web.archive.org/web/20110305211119/https%3A//www.microsoft.com/technet/security/bulletin/ms09-032.mspx" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2008-0015, https://web.archive.org/web/20110305211119/https://www.microsoft.com/technet/security/bulletin/ms09-032.mspx</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:163px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7796" target="_blank" rel="noreferrer noopener"><span>CVE-2020-7796</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:118.297px;"><div><div><p><span>Synacor&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:225.141px;"><div><div><p><span>Zimbra Collaboration Suite&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:787.859px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7796%2C%20https%3A//wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2020-7796, https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:163px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22175" target="_blank" rel="noreferrer noopener"><span>CVE-2021-22175</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:118.297px;"><div><div><p><span>GitLab&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:225.141px;"><div><div><p><span>GitLab&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:787.859px;"><div><div><p><span></span><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22175.json%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2021-22175" target="_blank" rel="noreferrer noopener"><span>https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22175.json, https://nvd.nist.gov/vuln/detail/CVE-2021-22175</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:163px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-7694" target="_blank" rel="noreferrer noopener"><span>CVE-2024-7694</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:118.297px;"><div><div><p><span>TeamT5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:225.141px;"><div><div><p><span>ThreatSonar&nbsp;Anti-Ransomware&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:787.859px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-7694%2C%20https%3A//teamt5.org/en/posts/vulnerability-notice-threat-sonar-anti-ransomware-20240715/%2C%20https%3A//www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2024-7694, https://teamt5.org/en/posts/vulnerability-notice-threat-sonar-anti-ransomware-20240715/, https://www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:163px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22769" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22769</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:118.297px;"><div><div><p><span>Dell&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:225.141px;"><div><div><p><span>RecoverPoint for Virtual Machines (RP4VMs)&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:787.859px;"><div><div><p><span></span><a href="https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-22769%2C%20https%3A//www.dell.com/support/kbdoc/en-us/000426742/recoverpoint-for-vms-apply-the-remediation-script-for-dsa%2C%20https%3A//www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079" target="_blank" rel="noreferrer noopener"><span>https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day, https://nvd.nist.gov/vuln/detail/CVE-2026-22769, https://www.dell.com/support/kbdoc/en-us/000426742/recoverpoint-for-vms-apply-the-remediation-script-for-dsa, https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:163px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-2441" target="_blank" rel="noreferrer noopener"><span>CVE-2026-2441</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:118.297px;"><div><div><p><span>Google&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:225.141px;"><div><div><p><span>Chromium&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:787.859px;"><div><div><p><span></span><a href="https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-2441" target="_blank" rel="noreferrer noopener"><span>https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html, https://nvd.nist.gov/vuln/detail/CVE-2026-2441</span></a><span>&nbsp;</span></p></div>
</div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div>
<div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:265px;"><div><div><p><span>Vendor&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:552px;"><div><div><p><span>Product&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:94.2812px;"><div><div><p><span>Critical&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:106.688px;"><div><div><p><span>High&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:108.906px;"><div><div><p><span>Medium&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:94.0625px;"><div><div><p><span>Low&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:91.4062px;"><div><div><p><span>Total&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:265px;"><div><div><p><span>Jinan USR IOT Technology Limited (PUSR)&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:552px;" class="zp-selected-cell"><div><div><p><span>USR-W610&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:94.2812px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:106.688px;"><div><div><p><span>2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:108.906px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:94.0625px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:91.4062px;"><div><div><p><span>4&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:265px;"><div><div><p><span>GE&nbsp;Vernova&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:552px;"><div><div><p><span>Enervista&nbsp;UR Setup&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:94.2812px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:106.688px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:108.906px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:94.0625px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:91.4062px;"><div><div><p><span>2&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:265px;"><div><div><p><span>EnOcean&nbsp;Edge Inc&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:552px;"><div><div><p><span>SmartServer&nbsp;IoT&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:94.2812px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:106.688px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:108.906px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:94.0625px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:91.4062px;"><div><div><p><span>2&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:265px;"><div><div><p><span>Welker&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:552px;"><div><div><p><span>OdorEyes&nbsp;EcoSystem&nbsp;Pulse Bypass System with XL4 Controller&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:94.2812px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:106.688px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:108.906px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:94.0625px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:91.4062px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:265px;"><div><div><p><span>Honeywell&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:552px;"><div><div><p><span>I-HIB2PI-UL 2MP IP&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:94.2812px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:106.688px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:108.906px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:94.0625px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:91.4062px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:265px;"><div><div><p><span>Delta Electronics&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:552px;"><div><div><p><span>ASDA-Soft&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:94.2812px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:106.688px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:108.906px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:94.0625px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:91.4062px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:265px;"><div><div><p><span>Valmet&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:552px;"><div><div><p><span>Valmet DNA Engineering Web Tools&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:94.2812px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:106.688px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:108.906px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:94.0625px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:91.4062px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p></div>
<div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Vendor&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Product&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVE&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Score&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Severity&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EPSS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Percentile&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CWE&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Honeywell&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>I-HIB2PI-UL 2MP IP&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1670" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1670</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.039%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>11.863%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Jinan USR IOT Technology Limited (PUSR)&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>USR-W610&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25715" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25715</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/521.html" target="_blank" rel="noreferrer noopener"><span>CWE-521</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Valmet&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Valmet DNA Engineering Web Tools&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-15577" target="_blank" rel="noreferrer noopener"><span>CVE-2025-15577</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.6&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.049%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>15.352%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/22.html" target="_blank" rel="noreferrer noopener"><span>CWE-22</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Welker&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>OdorEyes&nbsp;EcoSystem&nbsp;Pulse Bypass System with XL4 Controller&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24790" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24790</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EnOcean&nbsp;Edge Inc&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SmartServer&nbsp;IoT&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20761" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20761</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/77.html" target="_blank" rel="noreferrer noopener"><span>CWE-77</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Delta Electronics&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ASDA-Soft&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1361" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1361</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.011%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.514%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/121.html" target="_blank" rel="noreferrer noopener"><span>CWE-121</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>GE&nbsp;Vernova&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Enervista&nbsp;UR Setup&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1762" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1762</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.031%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.943%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/427.html" target="_blank" rel="noreferrer noopener"><span>CWE-427</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Jinan USR IOT Technology Limited (PUSR)&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>USR-W610&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24455" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24455</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/319.html" target="_blank" rel="noreferrer noopener"><span>CWE-319</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Jinan USR IOT Technology Limited (PUSR)&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>USR-W610&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-26048" target="_blank" rel="noreferrer noopener"><span>CVE-2026-26048</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Jinan USR IOT Technology Limited (PUSR)&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>USR-W610&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-26049" target="_blank" rel="noreferrer noopener"><span>CVE-2026-26049</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.7&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EnOcean&nbsp;Edge Inc&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SmartServer&nbsp;IoT&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22885" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22885</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.7&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener"><span>CWE-125</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>GE&nbsp;Vernova&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Enervista&nbsp;UR Setup&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1763" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1763</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.674%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/35.html" target="_blank" rel="noreferrer noopener"><span>CWE-35</span></a><span>&nbsp;</span></p></div>
</div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br> &nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de décembre 2025</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 5 mars&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;échanges&nbsp;de&nbsp;fichiers&nbsp;entre les zones&nbsp;industrielles&nbsp;et IT, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/7abb2065-6cf1-41bd-956a-9eaaf4655853%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
</div><br><p></p></div></div><br><br><p></p></div><p></p></div><p></p></div></div>
</div></div></div><div><div><div><div><p></p></div></div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div>]]></content:encoded><pubDate>Mon, 23 Feb 2026 08:16:00 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S7]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s7</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Menaces cyber contre le transport maritime canadien Ce rapport du Centre canadien pour la cybersécurité analyse les risques cyber visant le secteur du ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span></span></span></span></span><div><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span><span><span>Menaces cyber contre le transport maritime canadien</span></span></span></span></p></div>
<div><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><p style="margin-bottom:13.3333px;">Ce rapport du Centre canadien pour la cybersécurité analyse les risques cyber visant le secteur du transport maritime, qui représente plus de 8,3 milliards $ du PIB et une part majeure des importations (24 %) et exportations (18 %) du Canada. La menace principale provient des cybercriminels, surtout via le ransomware, qui peuvent bloquer les opérations portuaires et perturber les chaînes d’approvisionnement. La digitalisation croissante des ports et des navires (capteurs, OT connectée, systèmes satellitaires) élargit fortement la surface d’attaque. Les systèmes de positionnement (GPS, AIS) sont vulnérables au brouillage et au spoofing, pouvant entraîner des risques de navigation. Les États (Chine, Russie, Iran) ciblent le secteur pour l’espionnage économique, le vol de données logistiques et de propriété intellectuelle.</p><p style="margin-bottom:13.3333px;"></p><div><p style="font-weight:bold;"><span style="font-weight:bold;">LOTP : la nouvelle menace invisible au cœur des usines</span></p><p>Cet article présente le concept de « Living Off The Plant » (LOTP), une technique utilisant les fonctions natives des automates pour s'infiltrer dans les réseaux industriels. L'auteur démontre comment détourner des commandes légitimes pour circuler entre des équipements isolés, franchissant ainsi des barrières réseaux physiques ou série. Cette méthode de mouvement latéral permet d'agir sans utiliser de logiciels malveillants externes. L'objectif est d'alerter sur la vulnérabilité des architectures de sécurité actuelles et de repenser la protection des infrastructures critiques.</p><p><a href="https://www.researchgate.net/publication/399059887_Industrial_Ouroboros_Deep_Lateral_Movement_via_Living_Off_the_Plant/fulltext/694caeea06a9ab54f84a6f1b/Industrial-Ouroboros-Deep-Lateral-Movement-via-Living-Off-the-Plant.pdf?_tp=eyJjb250ZXh0Ijp7ImZpcnN0UG" rel="">https://www.researchgate.net/publication/399059887_Industrial_Ouroboros_Deep_Lateral_Movement_via_Living_Off_the_Plant/fulltext/694caeea06a9ab54f84a6f1b/Industrial-Ouroboros-Deep-Lateral-Movement-via-Living-Off-the-Plant.pdf?_tp=eyJjb250ZXh0Ijp7ImZpcnN0UG</a></p></div>
<p></p><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Campagne menée par APT28 exploitant la CVE-2026-21509</span></p><p>Le groupe de hackers APT28 lié à l’intelligence russe a lancé une campagne pour infecter des organisations européennes, notamment des agences maritimes et des compagnies de transport. Ce rapport détaille une nouvelle méthode d’intrusion ciblée contre des infrastructures critiques exploitant une faille récemment révélée dans Microsoft Office (CVE-2026-21509) dans les 24 heures suivant sa divulgation publique.</p><p><a href="https://www.trellix.com/blogs/research/apt28-stealthy-campaign-leveraging-cve-2026-21509-cloud-c2/" title="https://www.trellix.com/blogs/research/apt28-stealthy-campaign-leveraging-cve-2026-21509-cloud-c2/" rel="">https://www.trellix.com/blogs/research/apt28-stealthy-campaign-leveraging-cve-2026-21509-cloud-c2/</a></p><p></p><div><p style="margin-bottom:13.3333px;"><strong>L'intégration native de Sysmon dans Windows</strong><strong><br></strong></p><p style="margin-bottom:13.3333px;">L'article annonce l'intégration native de la fonctionnalité Sysmon dans Windows 11 et Windows Server 2025 pour simplifier la surveillance des menaces. Cette mise à jour supprime le besoin d'installations manuelles en automatisant la maintenance via Windows Update. Elle offre une visibilité sur les activités suspectes, comme le vol d'identifiants, tout en bénéficiant du support technique de Microsoft. Cette version autorise l'usage de fichiers de configuration personnalisés pour alimenter les outils d'analyse de sécurité. Enfin, Microsoft prévoit d'y intégrer prochainement des analyses basées sur l'intelligence artificielle.</p><div><a href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/native-sysmon-functionality-coming-to-windows/4468112%C2%A0" rel="">https://techcommunity.microsoft.com/blog/windows-itpro-blog/native-sysmon-functionality-coming-to-windows/4468112</a>&nbsp; </div>
</div><p></p><p style="margin-bottom:13.3333px;line-height:2;"></p><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnerability&nbsp;Corner :</span></span><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div>
<div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:144px;"><div><div><p><span>CVE&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Vendor&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Product&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span>Liens&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43468" target="_blank" rel="noreferrer noopener"><span>CVE-2024-43468</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Microsoft&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Configuration Manager&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43468%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2024-43468" target="_blank" rel="noreferrer noopener"><span>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43468, https://nvd.nist.gov/vuln/detail/CVE-2024-43468</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-15556" target="_blank" rel="noreferrer noopener"><span>CVE-2025-15556</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Notepad++&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Notepad++&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://community.notepad-plus-plus.org/topic/27298/notepad-v8-8-9-vulnerability-fix%2C%20https%3A//notepad-plus-plus.org/news/clarification-security-incident/%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-15556" target="_blank" rel="noreferrer noopener"><span>https://community.notepad-plus-plus.org/topic/27298/notepad-v8-8-9-vulnerability-fix, https://notepad-plus-plus.org/news/clarification-security-incident/, https://nvd.nist.gov/vuln/detail/CVE-2025-15556</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40536" target="_blank" rel="noreferrer noopener"><span>CVE-2025-40536</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>SolarWinds&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Web Help Desk&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_2026-1_release_notes.htm%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-40536%2C%20https%3A//www.solarwinds.com/trust-center/security-advisories/CVE-2025-40536" target="_blank" rel="noreferrer noopener"><span>https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_2026-1_release_notes.htm, https://nvd.nist.gov/vuln/detail/CVE-2025-40536, https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-40536</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20700" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20700</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Apple&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Multiple Products&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20700%2C%20https%3A//support.apple.com/en-us/126346%2C%20https%3A//support.apple.com/en-us/126348%2C%20https%3A//support.apple.com/en-us/126351%2C%20https%3A//support.apple.com/en-us/126352%2C%20https%3A//support.apple.com/en-us/126353" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2026-20700, https://support.apple.com/en-us/126346, https://support.apple.com/en-us/126348, https://support.apple.com/en-us/126351, https://support.apple.com/en-us/126352, https://support.apple.com/en-us/126353</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21510" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21510</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Microsoft&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Windows&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-21510" target="_blank" rel="noreferrer noopener"><span>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510, https://nvd.nist.gov/vuln/detail/CVE-2026-21510</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21513" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21513</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Microsoft&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Windows&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://msrc.microsoft.com/update-guide/advisory/CVE-2026-21513%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-21513" target="_blank" rel="noreferrer noopener"><span>https://msrc.microsoft.com/update-guide/advisory/CVE-2026-21513, https://nvd.nist.gov/vuln/detail/CVE-2026-21513</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21514" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21514</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Microsoft&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Office&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-21514" target="_blank" rel="noreferrer noopener"><span>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514, https://nvd.nist.gov/vuln/detail/CVE-2026-21514</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21519" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21519</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Microsoft&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Windows&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-21519" target="_blank" rel="noreferrer noopener"><span>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519, https://nvd.nist.gov/vuln/detail/CVE-2026-21519</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21525" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21525</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Microsoft&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Windows&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21525%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-21525" target="_blank" rel="noreferrer noopener"><span>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21525, https://nvd.nist.gov/vuln/detail/CVE-2026-21525</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21533" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21533</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Microsoft&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Windows&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-21533" target="_blank" rel="noreferrer noopener"><span>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533, https://nvd.nist.gov/vuln/detail/CVE-2026-21533</span></a><span>&nbsp;</span></p></div>
</div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div>
<div><div style="margin-bottom:2px;"><table border="1"><tbody><tr style="height:54.15px;"><td style="vertical-align:top;width:167.2px;"><div><div><p><span>Vendor&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:597.8px;"><div><div><p><span>Product&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:104.425px;"><div><div><p><span>Critical&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:103.45px;"><div><div><p><span>High&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:120.875px;"><div><div><p><span>Medium&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:101.4px;"><div><div><p><span>Low&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:120.363px;"><div><div><p><span>Total&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:167.2px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:597.8px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:104.425px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:103.45px;"><div><div><p><span>4&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:120.875px;"><div><div><p><span>5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:101.4px;"><div><div><p><span>5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:120.363px;"><div><div><p><span>14&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:167.2px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:597.8px;"><div><div><p><span>Desigo&nbsp;CC family V6,NX,Polarion V2404,SINEC&nbsp;NMS,Siveillance&nbsp;Video V2022 R3,Solid&nbsp;Edge&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:104.425px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:103.45px;"><div><div><p><span>8&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:120.875px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:101.4px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:120.363px;"><div><div><p><span>9&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:167.2px;"><div><div><p><span>AVEVA&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:597.8px;"><div><div><p><span>PI Data Archive PI&nbsp;Server,PI&nbsp;to CONNECT Agent&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:104.425px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:103.45px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:120.875px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:101.4px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:120.363px;"><div><div><p><span>2&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:167.2px;"><div><div><p><span>ZLAN Information Technology Co.&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:597.8px;"><div><div><p><span>ZLAN5143D&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:104.425px;"><div><div><p><span>2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:103.45px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:120.875px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:101.4px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:120.363px;"><div><div><p><span>2&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:167.2px;"><div><div><p><span>Airleader&nbsp;GmbH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:597.8px;"><div><div><p><span>Airleader&nbsp;Master&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:104.425px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:103.45px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:120.875px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:101.4px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:120.363px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:167.2px;"><div><div><p><span>ZOLL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:597.8px;"><div><div><p><span>ePCR&nbsp;IOS Mobile Application&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:104.425px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:103.45px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:120.875px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:101.4px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:120.363px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p></div>
<div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Vendor&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Product&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVE&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Score&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Severity&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EPSS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Percentile&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CWE&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Airleader&nbsp;GmbH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Airleader&nbsp;Master&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1358" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1358</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/434.html" target="_blank" rel="noreferrer noopener"><span>CWE-434</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>ZLAN Information Technology Co.&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ZLAN5143D&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24789" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24789</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.067%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>20.700%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>ZLAN Information Technology Co.&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ZLAN5143D&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25084" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25084</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.074%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>22.265%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Desigo&nbsp;CC family V6&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38545" target="_blank" rel="noreferrer noopener"><span>CVE-2023-38545</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.8&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>26.250%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>96.176%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/122.html" target="_blank" rel="noreferrer noopener"><span>CWE-122</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66597" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66597</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.029%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.888%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/327.html" target="_blank" rel="noreferrer noopener"><span>CWE-327</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66600" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66600</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.044%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>13.256%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/358.html" target="_blank" rel="noreferrer noopener"><span>CWE-358</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Solid Edge&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40936" target="_blank" rel="noreferrer noopener"><span>CVE-2025-40936</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.020%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.747%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener"><span>CWE-125</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>NX&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22923" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22923</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.006%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.269%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/121.html" target="_blank" rel="noreferrer noopener"><span>CWE-121</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>NX&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22924" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22924</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener"><span>CWE-125</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>NX&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22925" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22925</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener"><span>CWE-125</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SINEC NMS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25655" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25655</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.006%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.322%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/427.html" target="_blank" rel="noreferrer noopener"><span>CWE-427</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SINEC NMS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25656" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25656</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.006%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.322%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/427.html" target="_blank" rel="noreferrer noopener"><span>CWE-427</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Polarion&nbsp;V2404&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40587" target="_blank" rel="noreferrer noopener"><span>CVE-2025-40587</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.6&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.016%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.935%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer noopener"><span>CWE-79</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>AVEVA&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>PI Data Archive PI Server&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1507" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1507</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.054%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>17.000%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/248.html" target="_blank" rel="noreferrer noopener"><span>CWE-248</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66608" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66608</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.061%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>18.874%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/29.html" target="_blank" rel="noreferrer noopener"><span>CWE-29</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66598" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66598</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.029%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.803%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/327.html" target="_blank" rel="noreferrer noopener"><span>CWE-327</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>AVEVA&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>PI to CONNECT Agent&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1495" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1495</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.015%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.518%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/532.html" target="_blank" rel="noreferrer noopener"><span>CWE-532</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66601" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66601</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.044%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>13.256%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/358.html" target="_blank" rel="noreferrer noopener"><span>CWE-358</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Siveillance&nbsp;Video V2022 R3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-0836" target="_blank" rel="noreferrer noopener"><span>CVE-2025-0836</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.044%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>13.176%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer noopener"><span>CWE-862</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>ZOLL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ePCR&nbsp;IOS Mobile Application&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-12699" target="_blank" rel="noreferrer noopener"><span>CVE-2025-12699</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.011%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.338%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/538.html" target="_blank" rel="noreferrer noopener"><span>CWE-538</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66594" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66594</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.042%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>12.655%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/209.html" target="_blank" rel="noreferrer noopener"><span>CWE-209</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66595" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66595</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.019%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.353%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/352.html" target="_blank" rel="noreferrer noopener"><span>CWE-352</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66599" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66599</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.042%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>12.655%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/497.html" target="_blank" rel="noreferrer noopener"><span>CWE-497</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66602" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66602</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.041%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>12.217%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/291.html" target="_blank" rel="noreferrer noopener"><span>CWE-291</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66607" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66607</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.7&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.044%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>13.256%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/358.html" target="_blank" rel="noreferrer noopener"><span>CWE-358</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66606" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66606</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.4&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.047%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>14.428%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/86.html" target="_blank" rel="noreferrer noopener"><span>CWE-86</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66603" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66603</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.044%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>13.256%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/358.html" target="_blank" rel="noreferrer noopener"><span>CWE-358</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66604" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66604</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.029%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.888%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/319.html" target="_blank" rel="noreferrer noopener"><span>CWE-319</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66605" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66605</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.042%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>12.655%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/359.html" target="_blank" rel="noreferrer noopener"><span>CWE-359</span></a><span>&nbsp;</span></p></div>
</div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br> &nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de décembre 2025</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 5 mars&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;échanges&nbsp;de&nbsp;fichiers&nbsp;entre les zones&nbsp;industrielles&nbsp;et IT, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/7abb2065-6cf1-41bd-956a-9eaaf4655853%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
</div><br><br><p></p></div></div></div></div></div><div><div><div><div><p></p></div>
</div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div>]]></content:encoded><pubDate>Sun, 15 Feb 2026 15:27:39 +0100</pubDate></item><item><title><![CDATA[Bilan des Known Exploited Vulnerabilities du mois de janvier 2026]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-janvier-2026</link><description><![CDATA[? Bilan des Known Exploited Vulnerabilities du mois de janvier 2026 ⚠️&nbsp; En janvier 2026, l’agence de cybersécurité américaine (CISA) a ajouté 17 ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_oDkejEquSTCm9QqUenH7tg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_SIKykFb_TsWa-AUxhhWfNw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_QFmKC9SjRNSAyKRyxg67gg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_7SNFdUZukMdrsRG_8B6vOg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><p></p><p><span><span></span></span></p><p><span><span></span></span></p><p></p><div><p></p><div><div> 💥 Bilan des Known Exploited Vulnerabilities du mois de janvier 2026 </div>
<div><br></div><div> ⚠️&nbsp; En janvier 2026, l’agence de cybersécurité américaine (CISA) a ajouté 17 vulnérabilités, identifiées comme activement exploitées dans le cadre de cyberattaques, dans sa liste des Known Exploited Vulnerabilities (KEV), le nombre de KEV est en hausse (-3) par rapport au mois précédent. </div>
<div><br></div><div> La tendance générale sur les 12 derniers mois est en légère augmentation du fait du pic exceptionnel du mois dernier. </div>
<div> À date, 1507 KEV sont référencées. </div><div> 🎆 L'objectif de cette liste est de permettre aux organisations de prioriser leurs actions de patching. Afin de se rendre compte de l'importance des nouvelles entrées dans cette liste : toutes les agences de l’administration américaine doivent corriger ces vulnérabilités dans les 21 jours qui suivent l'ajout dans la liste ! </div>
<div> ☣️&nbsp; KEV exploitées par un ransomware : aucune </div><div><br></div><div><span><img src="https://www.fortress-cybersecurity.fr/Sun%20Feb%2008%202026.png" alt=""></span><br></div>
<div><br></div><div> 🔥 Liste des autres KEV : </div><div> 3 × Microsoft : </div>
<div> &nbsp; Office (CVE-2026-21509) </div><div> &nbsp; Windows (CVE-2026-20805) </div>
<div> &nbsp; Office (CVE-2009-0556) </div><div> 2 × SmarterTools : </div><div> &nbsp; SmarterMail (CVE-2025-52691) </div>
<div> &nbsp; SmarterMail (CVE-2026-23760) </div><div> 1 × Fortinet : </div><div> &nbsp; Multiple Products (CVE-2026-24858) </div>
<div> 1 × Ivanti : </div><div> &nbsp; Endpoint Manager Mobile (EPMM) (CVE-2026-1281) </div>
<div> 1 × Linux : </div><div> &nbsp; Kernal (CVE-2018-14634) </div><div> 1 × GNU : </div>
<div> &nbsp; InetUtils (CVE-2026-24061) </div><div> 1 × Broadcom : </div><div> &nbsp; VMware vCenter Server (CVE-2024-37079) </div>
<div> 1 × Synacor : </div><div> &nbsp; &nbsp;Zimbra Collaboration Suite (ZCS) (CVE-2025-68645) </div>
<div> 1 × Versa : </div><div> &nbsp; Concerto (CVE-2025-34026) </div><div> 1 × Vite : </div>
<div> &nbsp; Vitejs (CVE-2025-31125) </div><div> 1 × Prettier : </div><div> &nbsp; eslint-config-prettier (CVE-2025-54313) </div>
<div> 1 × Cisco : </div><div> &nbsp; Unified Communications Manager (CVE-2026-20045) </div>
<div> 1 × Gogs : </div><div> &nbsp; Gogs (CVE-2025-8110) </div><div> 1 × Hewlett Packard Enterprise (HPE) : </div>
<div> &nbsp; OneView (CVE-2025-37164) </div><br><div><br></div></div><br><br><p></p></div>
<p></p><p></p><p></p></div></div></div></div></div></div></div>]]></content:encoded><pubDate>Sun, 08 Feb 2026 19:22:27 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S6]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s6</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Des satellites espions russes ont potentiellement intercepté les communications de satellites européens clés Selon une enquête du Financial Times, des ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span></span></span></span></span><div><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span><span>Des satellites espions russes ont potentiellement intercepté les communications de satellites européens clés</span></span></span></p></div>
<div><div><p style="margin-bottom:13.3333px;">Selon une enquête du Financial Times, des satellites espions russes auraient été en mesure d’intercepter les communications de plusieurs satellites européens stratégiques. Les autorités s’inquiètent du fait que certaines données sensibles, notamment les commandes de contrôle, ne soient pas chiffrées, en raison de l’ancienneté de nombreux satellites dépourvus de capacités de chiffrement avancées.</p><a href="https://www.ft.com/content/cd08c49c-658e-49c9-9a15-234f2bfc2074?accessToken=zwAGSfx71WnQkdPNCMScZY5JydOaFSNPK_wgdA.MEYCIQCfIo-xwIzKl6Rj8Yc80moWlg3qppbpuQ3cJKlt-dXVhQIhAN2mzsy8lpLFcWLKAa3opFRv4qR8RFkTCyDpoEg31R9h&amp;sharetype=gift&amp;token=a601ce5f-4c3c-42f9-98e" rel="">https://www.ft.com/content/cd08c49c-658e-49c9-9a15-234f2bfc2074?accessToken=zwAGSfx71WnQkdPNCMScZY5JydOaFSNPK_wgdA.MEYCIQCfIo-xwIzKl6Rj8Yc80moWlg3qppbpuQ3cJKlt-dXVhQIhAN2mzsy8lpLFcWLKAa3opFRv4qR8RFkTCyDpoEg31R9h&amp;sharetype=gift&amp;token=a601ce5f-4c3c-42f9-98e</a><a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_26_105" title="https://ec.europa.eu/commission/presscorner/detail/en/ip_26_105" rel=""><br></a></div>
</div></div><p style="margin-bottom:13.3333px;"><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"></span></p><div><div style="clear:both;overflow:visible;direction:ltr;"><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span><span><span>Menace Salt Typhoon sur les infrastructures 5G</span></span></span></span></p><p style="margin-bottom:13.3333px;"><span><span><span>Ce rapport, publié par Booz Allen et Palo Alto Networks, deux acteurs majeurs du conseil en cybersécurité et des technologies de défense des réseaux, explique que les infrastructures 5G sont devenues une cible stratégique pour des groupes APT étatiques comme Salt Typhoon, capables d’infiltrer les réseaux télécoms pour espionner et exfiltrer des données sensibles. Les attaques reposent sur des identifiants volés, des compromissions de la supply chain et des techniques furtives difficiles à détecter.</span></span></span></p><p style="margin-bottom:13.3333px;"><a href="https://www.boozallen.com/expertise/tech-ecosystem/5g-technology/hardening-5g-infrastructure-against-salt-typhoon.html" title="https://www.boozallen.com/expertise/tech-ecosystem/5g-technology/hardening-5g-infrastructure-against-salt-typhoon.html" rel="">https://www.boozallen.com/expertise/tech-ecosystem/5g-technology/hardening-5g-infrastructure-against-salt-typhoon.html</a></p><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Sécuriser l'OT : l'autre défi de la transition énergétique britannique</span><br></span></p><p style="margin-bottom:13.3333px;">Cet article souligne l'urgence de sécuriser les technologies opérationnelles (OT) du secteur énergétique britannique face à sa transition vers un modèle décentralisé et renouvelable. Phil Tonkin (Field CTO at Dragos<i>), </i>explique que la multiplication des petites installations connectées et des systèmes de stockage par batterie accroît la surface d'attaque, rendant le réseau vulnérable à des pannes en cascade. Pour garantir la sécurité nationale, il préconise de dépasser la simple conformité réglementaire en investissant dans la visibilité des actifs, la segmentation des réseaux et la formation de personnel qualifié.<br></p><p style="margin-bottom:13.3333px;"><a href="https://energy-oil-gas.com/news/ot-cybersecurity-issues-facing-the-uk-energy-industry/" title="https://energy-oil-gas.com/news/ot-cybersecurity-issues-facing-the-uk-energy-industry/" rel="">https://energy-oil-gas.com/news/ot-cybersecurity-issues-facing-the-uk-energy-industry/</a><br></p><p style="margin-bottom:13.3333px;"><span><span><strong>Allemagne : Entrée en vigueur de la loi NIS-2 et renforcement des obligations cyber</strong></span></span><br></p><p style="margin-bottom:13.3333px;"><span><span>La loi d'application NIS-2 en Allemagne modernise le cadre législatif cyber en élargissant la surveillance à 30 000 entreprises, incluant désormais les PME industrielles. Elle impose des obligations strictes de gestion des risques, un signalement des incidents sous 24 heures et une responsabilité directe des dirigeants. L'objectif est d'harmoniser la résilience opérationnelle du pays avec les standards européens d'ici avril 2026.<br></span></span></p><p style="margin-bottom:13.3333px;"><a href="https://cyble.com/blog/nis-2-implementation-act-germany/" title="https://cyble.com/blog/nis-2-implementation-act-germany/" rel="">https://cyble.com/blog/nis-2-implementation-act-germany/</a><br></p></div>
<div><p style="margin-bottom:13.3333px;line-height:1;"></p><div><p style="margin-bottom:13.3333px;"></p><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"></span></p></div>
</div></div></div><div><p style="margin-bottom:13.3333px;"></p><div><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnerability&nbsp;Corner :</span></span><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div>
<div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:206.2px;"><div><div><p><span>CVE&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:211.387px;"><div><div><p><span>Vendor&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:300.613px;"><div><div><p><span>Product&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:573.15px;"><div><div><p><span>Liens&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:206.2px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19006" target="_blank" rel="noreferrer noopener"><span>CVE-2019-19006</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:211.387px;"><div><div><p><span>Sangoma&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:300.613px;"><div><div><p><span>FreePBX&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:573.15px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19006%2C%20https%3A//wiki.freepbx.org/display/FOP/2019-11-20%2BRemote%2BAdmin%2BAuthentication%2BBypass" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2019-19006, https://wiki.freepbx.org/display/FOP/2019-11-20%2BRemote%2BAdmin%2BAuthentication%2BBypass</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:206.2px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39935" target="_blank" rel="noreferrer noopener"><span>CVE-2021-39935</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:211.387px;"><div><div><p><span>GitLab&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:300.613px;"><div><div><p><span>Community and Enterprise Editions&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:573.15px;"><div><div><p><span></span><a href="https://about.gitlab.com/releases/2021/12/06/security-release-gitlab-14-5-2-released/%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2021-39935" target="_blank" rel="noreferrer noopener"><span>https://about.gitlab.com/releases/2021/12/06/security-release-gitlab-14-5-2-released/, https://nvd.nist.gov/vuln/detail/CVE-2021-39935</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:206.2px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11953" target="_blank" rel="noreferrer noopener"><span>CVE-2025-11953</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:211.387px;"><div><div><p><span>React Native Community&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:300.613px;"><div><div><p><span>CLI&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:573.15px;"><div><div><p><span></span><a href="https://github.com/react-native-community/cli/commit/15089907d1f1301b22c72d7f68846a2ef20df547%2C%20https%3A//github.com/react-native-community/cli/pull/2735%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-11953" target="_blank" rel="noreferrer noopener"><span>https://github.com/react-native-community/cli/commit/15089907d1f1301b22c72d7f68846a2ef20df547, https://github.com/react-native-community/cli/pull/2735, https://nvd.nist.gov/vuln/detail/CVE-2025-11953</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:206.2px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64328" target="_blank" rel="noreferrer noopener"><span>CVE-2025-64328</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:211.387px;"><div><div><p><span>Sangoma&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:300.613px;"><div><div><p><span>FreePBX&nbsp;&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:573.15px;"><div><div><p><span></span><a href="https://github.com/FreePBX/security-reporting/security/advisories/GHSA-vm9p-46mv-5xvw%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-64328" target="_blank" rel="noreferrer noopener"><span>https://github.com/FreePBX/security-reporting/security/advisories/GHSA-vm9p-46mv-5xvw, https://nvd.nist.gov/vuln/detail/CVE-2025-64328</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:206.2px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24423" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24423</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:211.387px;"><div><div><p><span>SmarterTools&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:300.613px;"><div><div><p><span>SmarterMail&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:573.15px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24423%2C%20https%3A//www.cve.org/CVERecord?id=CVE-2026-24423%2C%20https%3A%2F%2Fwww.smartertools.com%2Fsmartermail%2Frelease-notes%2Fcurrent" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2026-24423, https://www.cve.org/CVERecord?id=CVE-2026-24423, https://www.smartertools.com/smartermail/release-notes/current</span></a><span>&nbsp;</span></p></div>
</div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div>
<div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Vendor&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Product&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Critical&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>High&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Medium&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Low&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Total&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Avation&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Light Engine Pro&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Mitsubishi Electric&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>FREQSHIP-mini for Windows&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>RISS SRL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>MOMA Seismic Station&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Synectix&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>LAN 232 TRIO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p></div>
<div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Vendor&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Product&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVE&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Score&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Severity&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EPSS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Percentile&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CWE&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Synectix&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LAN 232 TRIO&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1633" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1633</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>10.0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.054%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>17.083%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Avation&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Light Engine Pro&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1341" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1341</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.016%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.895%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>RISS SRL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MOMA Seismic Station&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1632" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1632</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.133%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>33.272%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Mitsubishi Electric&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FREQSHIP-mini for Windows&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-10314" target="_blank" rel="noreferrer noopener"><span>CVE-2025-10314</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.8&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.009%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.682%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/276.html" target="_blank" rel="noreferrer noopener"><span>CWE-276</span></a><span>&nbsp;</span></p></div>
</div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br> &nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de décembre 2025</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 5 mars&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;échanges&nbsp;de&nbsp;fichiers&nbsp;entre les zones&nbsp;industrielles&nbsp;et IT, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/7abb2065-6cf1-41bd-956a-9eaaf4655853%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
</div><p></p></div></div></div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div>]]></content:encoded><pubDate>Sun, 08 Feb 2026 18:57:55 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S5]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s5</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>L’UE renforce sa résilience face aux cybermenaces La Commission européenne a présenté un nouveau paquet cybersécurité pour mieux protéger l’UE face aux ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span></span></span></span></span><div><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">L’UE renforce sa résilience face aux cybermenaces</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>La Commission européenne a présenté un nouveau paquet cybersécurité pour mieux protéger l’UE face aux cyberattaques visant les services essentiels et les institutions démocratiques. Il prévoit une révision du Cybersecurity Act afin de sécuriser les chaînes d’approvisionnement ICT, notamment face aux fournisseurs à risque hors UE. Le cadre européen de certification cybersécurité est simplifié pour garantir des produits “secure by design” tout en réduisant les coûts pour les entreprises. Des ajustements ciblés de la directive NIS2 visent à clarifier les obligations et alléger la charge de conformité pour près de 28 700 entreprises, dont de nombreuses PME. Enfin, le rôle de l’ENISA est renforcé pour améliorer la détection, la réponse aux incidents et le développement des compétences en cybersécurité en Europe.</span></p><a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_26_105" title="https://ec.europa.eu/commission/presscorner/detail/en/ip_26_105" rel="">https://ec.europa.eu/commission/presscorner/detail/en/ip_26_105</a><a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_26_105" title="https://ec.europa.eu/commission/presscorner/detail/en/ip_26_105" rel=""><br></a></div>
</div><p style="margin-bottom:13.3333px;"><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"></span></p><div><div style="clear:both;overflow:visible;direction:ltr;"><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span><span>Transformation technologique et industrielle en 2026</span></span></span></p><p style="margin-bottom:13.3333px;"><span><span><span>L'article présente les changements technologiques majeurs prévus pour l'année 2026. Il cherche à démontrer que la sécurité informatique, la production industrielle et le travail humain doivent désormais s'adapter à l'intelligence artificielle. Cette transition illustré par des exemples de partenariats entre la Turquie et le Royaume-Uni, dont le but est de financer l'IA "physique" pour automatiser l'impression 3D industrielle. L'importance des infrastructures, comme la 5G, pour soutenir ces évolutions technologique est mis en avant. Enfin, l'article nous permet de comprendre comment les entreprises et les employés réagissent à ces transformations numériques.&nbsp;</span></span></span></p><p style="margin-bottom:13.3333px;"><a href="https://www.dailysabah.com/business/tech/iot-expansion-forcing-rethink-of-cybersecurity-architecture" title="https://www.dailysabah.com/business/tech/iot-expansion-forcing-rethink-of-cybersecurity-architecture" rel="">https://www.dailysabah.com/business/tech/iot-expansion-forcing-rethink-of-cybersecurity-architecture</a><br></p><p style="margin-bottom:13.3333px;"><span><span style="font-weight:bold;"></span></span></p><p><strong>Cybersécurité OT-IT : naviguer dans la nouvelle frontière du risque</strong></p><p></p><p style="margin-bottom:13.3333px;"><span><span>La convergence entre les systèmes IT et OT entraîne une évolution de la surface d’attaque. Elle crée de nouvelles opportunités tout en introduisant des enjeux de cybersécurité. L’article identifie six domaines affectés par cette convergence, notamment l’évolution des menaces liée à l’usage de l’IA et la nécessité de mettre en œuvre des principes Zero Trust dans des environnements de plus en plus interconnectés.</span></span><br></p><p style="margin-bottom:13.3333px;"><a href="https://www.forbes.com/sites/chuckbrooks/2026/01/27/otit-cybersecurity-navigating-the-new-frontier-of-risk/" title="https://www.forbes.com/sites/chuckbrooks/2026/01/27/otit-cybersecurity-navigating-the-new-frontier-of-risk/" rel="">https://www.forbes.com/sites/chuckbrooks/2026/01/27/otit-cybersecurity-navigating-the-new-frontier-of-risk/</a><br></p></div>
<div><p style="margin-bottom:13.3333px;line-height:1;"></p><div><p style="margin-bottom:13.3333px;"></p><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span></span></span></p></div>
</div></div></div><div><p style="margin-bottom:13.3333px;"></p><div><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnerability&nbsp;Corner :</span></span><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div>
</div><p></p><table border="1"><tbody><tr><td style="vertical-align:top;width:195px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:132px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:123.844px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:834.156px;"><div><p><strong>Liens&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:195px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-14634" target="_blank" rel="noreferrer noopener">CVE-2018-14634</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132px;"><div><p>Linux&nbsp;</p></div></td><td style="vertical-align:top;width:123.844px;"><div><p>Kernal&nbsp;</p></div></td><td style="vertical-align:top;width:834.156px;"><div><p><a href="https://access.redhat.com/errata/RHSA-2018%3A3540%2C%20https%3A//git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/about/%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2018-14634%2C%20https%3A//www.cve.org/CVERecord?id=CVE-2018-14634%2C%20https%3A%2F%2Fwww.kernel.org%2F" target="_blank" rel="noreferrer noopener">https://access.redhat.com/errata/RHSA-2018:3540, https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/about/, https://nvd.nist.gov/vuln/detail/CVE-2018-14634, https://www.cve.org/CVERecord?id=CVE-2018-14634, https://www.kernel.org/</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:195px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-52691" target="_blank" rel="noreferrer noopener">CVE-2025-52691</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132px;"><div><p>SmarterTools&nbsp;</p></div></td><td style="vertical-align:top;width:123.844px;"><div><p>SmarterMail&nbsp;</p></div></td><td style="vertical-align:top;width:834.156px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-52691%2C%20https%3A//www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-124/%2C%20https%3A//www.smartertools.com/smartermail/release-notes/current" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2025-52691, https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-124/, https://www.smartertools.com/smartermail/release-notes/current</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:195px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1281" target="_blank" rel="noreferrer noopener">CVE-2026-1281</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132px;"><div><p>Ivanti&nbsp;</p></div></td><td style="vertical-align:top;width:123.844px;"><div><p>Endpoint Manager Mobile (EPMM)&nbsp;</p></div></td><td style="vertical-align:top;width:834.156px;"><div><p><a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-1281%2C%20https%3A//support.mobileiron.com/mi/vsp/AB1771634/ivanti-security-update-1761642-1.0.0L-5.noarch.rpm%2C%20https%3A//support.mobileiron.com/mi/vsp/AB1771634/ivanti-security-update-1761642-1.0.0S-5.noarch.rpm" target="_blank" rel="noreferrer noopener">https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340, https://nvd.nist.gov/vuln/detail/CVE-2026-1281, https://support.mobileiron.com/mi/vsp/AB1771634/ivanti-security-update-1761642-1.0.0L-5.noarch.rpm, https://support.mobileiron.com/mi/vsp/AB1771634/ivanti-security-update-1761642-1.0.0S-5.noarch.rpm</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:195px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23760" target="_blank" rel="noreferrer noopener">CVE-2026-23760</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132px;"><div><p>SmarterTools&nbsp;</p></div></td><td style="vertical-align:top;width:123.844px;"><div><p>SmarterMail&nbsp;</p></div></td><td style="vertical-align:top;width:834.156px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23760%2C%20https%3A//www.smartertools.com/smartermail/release-notes/current" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2026-23760, https://www.smartertools.com/smartermail/release-notes/current</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:195px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24061" target="_blank" rel="noreferrer noopener">CVE-2026-24061</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132px;"><div><p>GNU&nbsp;</p></div></td><td style="vertical-align:top;width:123.844px;"><div><p>InetUtils&nbsp;</p></div></td><td style="vertical-align:top;width:834.156px;"><div><p><a href="https://cgit.git.savannah.gnu.org/cgit/inetutils.git%2C%20https%3A//codeberg.org/inetutils/inetutils/commit/ccba9f748aa8d50a38d7748e2e60362edd6a32cc%2C%20https%3A//codeberg.org/inetutils/inetutils/commit/fd702c02497b2f398e739e3119bed0b23dd7aa7b%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-24061" target="_blank" rel="noreferrer noopener">https://cgit.git.savannah.gnu.org/cgit/inetutils.git, https://codeberg.org/inetutils/inetutils/commit/ccba9f748aa8d50a38d7748e2e60362edd6a32cc, https://codeberg.org/inetutils/inetutils/commit/fd702c02497b2f398e739e3119bed0b23dd7aa7b, https://nvd.nist.gov/vuln/detail/CVE-2026-24061</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:195px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24858" target="_blank" rel="noreferrer noopener">CVE-2026-24858</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132px;"><div><p>Fortinet&nbsp;</p></div></td><td style="vertical-align:top;width:123.844px;"><div><p>Multiple Products&nbsp;</p></div></td><td style="vertical-align:top;width:834.156px;"><div><p><a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-060%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-24858%2C%20https%3A//www.fortinet.com/blog/psirt-blogs/analysis-of-sso-abuse-on-fortios" target="_blank" rel="noreferrer noopener">https://fortiguard.fortinet.com/psirt/FG-IR-26-060, https://nvd.nist.gov/vuln/detail/CVE-2026-24858, https://www.fortinet.com/blog/psirt-blogs/analysis-of-sso-abuse-on-fortios</a>&nbsp;</p></div></td></tr></tbody></table><div><div><div style="margin-bottom:2px;"></div>
</div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;"></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:200px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:627px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:86.9531px;"><div><p><strong>Critical&nbsp;</strong></p></div></td><td style="vertical-align:top;width:95.9844px;"><div><p><strong>High&nbsp;</strong></p></div></td><td style="vertical-align:top;width:105px;"><div><p><strong>Medium&nbsp;</strong></p></div></td><td style="vertical-align:top;width:103.938px;"><div><p><strong>Low&nbsp;</strong></p></div></td><td style="vertical-align:top;width:100.875px;"><div><p><strong>Total&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:200px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:627px;"><div><p>ArmorStart&nbsp;LT 290D,ControlLogix&nbsp;Redundancy Enhanced Module Catalog 1756-RM2 Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:86.9531px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:95.9844px;"><div><p>10&nbsp;</p></div></td><td style="vertical-align:top;width:105px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:103.938px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:100.875px;"><div><p>10&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:200px;"><div><p>iba&nbsp;Systems&nbsp;</p></div></td><td style="vertical-align:top;width:627px;"><div><p>ibaPDA&nbsp;</p></div></td><td style="vertical-align:top;width:86.9531px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:95.9844px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:105px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:103.938px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:100.875px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:200px;"><div><p>Johnson Controls&nbsp;</p></div></td><td style="vertical-align:top;width:627px;"><div><p>Metasys Application and Data Server (ADS)&nbsp;</p></div></td><td style="vertical-align:top;width:86.9531px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:95.9844px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:105px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:103.938px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:100.875px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:200px;"><div><p>KiloView&nbsp;</p></div></td><td style="vertical-align:top;width:627px;" class="zp-selected-cell"><div><p>Encoder Series E1 hardware Version 1.4&nbsp;</p></div></td><td style="vertical-align:top;width:86.9531px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:95.9844px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:105px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:103.938px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:100.875px;"><div><p>1&nbsp;</p></div></td></tr></tbody></table></div>
</div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p><p style="margin-bottom:13.3333px;">Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</p></div>
<div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:191px;" class="zp-selected-cell"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:293px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:132.281px;"><div><p><strong>CVSSv3 Score&nbsp;</strong></p></div></td><td style="vertical-align:top;width:152.766px;"><div><p><strong>CVSSv3 Severity&nbsp;</strong></p></div></td><td style="vertical-align:top;width:137.5px;"><div><p><strong>EPSS&nbsp;</strong></p></div></td><td style="vertical-align:top;width:151.859px;"><div><p><strong>Percentile&nbsp;</strong></p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><strong>CWE&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Johnson Controls&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>Metasys Application and Data Server (ADS)&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-26385" target="_blank" rel="noreferrer noopener">CVE-2025-26385</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>10.0&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.599%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>68.871%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/77.html" target="_blank" rel="noreferrer noopener">CWE-77</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>iba&nbsp;Systems&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ibaPDA&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14988" target="_blank" rel="noreferrer noopener">CVE-2025-14988</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.041%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>12.252%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/732.html" target="_blank" rel="noreferrer noopener">CWE-732</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>KiloView&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>Encoder Series E1 hardware Version 1.4&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1453" target="_blank" rel="noreferrer noopener">CVE-2026-1453</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.071%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>21.754%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener">CWE-306</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ControlLogix Redundancy Enhanced Module Catalog 1756-RM2 Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14027" target="_blank" rel="noreferrer noopener">CVE-2025-14027</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.055%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>17.374%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/401.html" target="_blank" rel="noreferrer noopener">CWE-401</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ArmorStart&nbsp;LT 290D&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9278" target="_blank" rel="noreferrer noopener">CVE-2025-9278</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.055%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>17.374%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noreferrer noopener">CWE-400</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ArmorStart&nbsp;LT 290D&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9279" target="_blank" rel="noreferrer noopener">CVE-2025-9279</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.092%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>26.044%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noreferrer noopener">CWE-400</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ArmorStart&nbsp;LT 290D&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9280" target="_blank" rel="noreferrer noopener">CVE-2025-9280</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.055%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>17.374%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noreferrer noopener">CWE-400</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ArmorStart&nbsp;LT 290D&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9281" target="_blank" rel="noreferrer noopener">CVE-2025-9281</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.092%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>26.044%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noreferrer noopener">CWE-400</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ArmorStart&nbsp;LT 290D&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9282" target="_blank" rel="noreferrer noopener">CVE-2025-9282</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.092%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>26.044%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noreferrer noopener">CWE-400</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ArmorStart&nbsp;LT 290D&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9283" target="_blank" rel="noreferrer noopener">CVE-2025-9283</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.092%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>26.044%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noreferrer noopener">CWE-400</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ArmorStart&nbsp;LT 290D&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9464" target="_blank" rel="noreferrer noopener">CVE-2025-9464</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.055%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>17.374%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noreferrer noopener">CWE-400</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ArmorStart&nbsp;LT 290D&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9465" target="_blank" rel="noreferrer noopener">CVE-2025-9465</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.092%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>26.044%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noreferrer noopener">CWE-400</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ArmorStart&nbsp;LT 290D&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9466" target="_blank" rel="noreferrer noopener">CVE-2025-9466</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.092%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>26.044%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noreferrer noopener">CWE-400</a>&nbsp;</p></div></td></tr></tbody></table></div>
</div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity</span><span><br></span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" title="- Bilan des Known Exploited Vulnerabilities du mois de décembre 2025" target="_blank" rel="">-</a><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" title="- Bilan des Known Exploited Vulnerabilities du mois de décembre 2025" target="_blank" rel=""> Bilan des Known Exploited Vulnerabilities du mois de décembre 2025</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;février&nbsp;2026 :&nbsp;Construire&nbsp;le plan de protection de&nbsp;ses&nbsp;installations&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/ff70c30b-3a81-44d5-a118-8541407e5699%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 5 mars&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;échanges&nbsp;de&nbsp;fichiers&nbsp;entre les zones&nbsp;industrielles&nbsp;et IT, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/7abb2065-6cf1-41bd-956a-9eaaf4655853%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
</div><p style="margin-bottom:13.3333px;"><br></p></div><br><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div>]]></content:encoded><pubDate>Sun, 01 Feb 2026 18:58:51 +0100</pubDate></item><item><title><![CDATA[Bilan des Known Exploited Vulnerabilities du mois de décembre 2025]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-décembre-2025</link><description><![CDATA[⚠️&nbsp; En December 2025, l’agence de cybersécurité américaine (CISA) a ajouté 20 vulnérabilités, identifiées comme activement exploitées dans le cad ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_oDkejEquSTCm9QqUenH7tg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_SIKykFb_TsWa-AUxhhWfNw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_QFmKC9SjRNSAyKRyxg67gg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_7SNFdUZukMdrsRG_8B6vOg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><p></p><p><span><span></span></span></p><p><span><span></span></span></p><p></p><div><div> ⚠️&nbsp; En December 2025, l’agence de cybersécurité américaine (CISA) a ajouté 20 vulnérabilités, identifiées comme activement exploitées dans le cadre de cyberattaques, dans sa liste des Known Exploited Vulnerabilities (KEV), le nombre de KEV est en hausse (9) par rapport au mois précédent. </div>
<div><br></div><div> ☣️&nbsp; 1 x KEV exploitées par un ransomware sur les produits des éditeurs suivants :&nbsp;<span>Meta.</span></div>
<br><div> 🔥 Editeurs concernés par les KEV : ASUS, Android, Apple, Array Networks , Cisco, D-Link, Digiever, Fortinet, Gladinet, Google, Meta, Microsoft, MongoDB, OSGeo, OpenPLC, RARLAB, Sierra Wireless, SonicWall, WatchGuard. </div>
<div><br></div><div><span>À date, 1494 KEV sont référencées.</span><br></div><div><br></div>
<div><div><strong>La tendance générale sur les 12 derniers mois est en légére baisse :</strong></div>
</div><div><span><img src="https://www.fortress-cybersecurity.fr/Mon%20Jan%2026%202026.png" alt=""></span><br></div>
<div><br></div><div> 🎆 L'objectif de cette liste est de permettre aux organisations de prioriser leurs actions de patching. Afin de se rendre compte de l'importance des nouvelles entrées dans cette liste : toutes les agences de l’administration américaine doivent corriger ces vulnérabilités dans les 21 jours qui suivent l'ajout dans la liste ! </div>
<div><br></div><div> ☣️&nbsp; KEV exploitées par un ransomware : </div><div> 1 x Meta : React Server Components (CVE-2025-55182) </div>
<div> 🔥 Liste des autres KEV : </div><div> 2 × Android : </div><div> &nbsp; Framework (CVE-2025-48633) </div>
<div> &nbsp; Framework (CVE-2025-48572) </div><div> 1 × Digiever : </div><div> &nbsp; DS-2105 Pro (CVE-2023-52163) </div>
<div> 1 × MongoDB : </div><div> &nbsp; MongoDB and MongoDB Server (CVE-2025-14847) </div>
<div> 1 × WatchGuard : </div><div> &nbsp; Firebox (CVE-2025-14733) </div><div> 1 × ASUS : </div>
<div> &nbsp; Live Update (CVE-2025-59374) </div><div> 1 × Cisco : </div><div> &nbsp; Multiple Products (CVE-2025-20393) </div>
<div> 1 × SonicWall : </div><div> &nbsp; SMA1000 appliance (CVE-2025-40602) </div>
<div> 1 × Gladinet : </div><div> &nbsp; CentreStack and Triofox (CVE-2025-14611) </div>
<div> 1 × Apple : </div><div> &nbsp; Multiple Products (CVE-2025-43529) </div><div> 1 × Sierra Wireless : </div>
<div> &nbsp; AirLink ALEOS (CVE-2018-4063) </div><div> 1 × Fortinet : </div><div> &nbsp; Multiple Products (CVE-2025-59718) </div>
<div> 1 × Google : </div><div> &nbsp; Chromium (CVE-2025-14174) </div><div> 1 × OSGeo : </div>
<div> &nbsp; GeoServer (CVE-2025-58360) </div><div> 1 × Microsoft : </div><div> &nbsp; Windows (CVE-2025-62221) </div>
<div> 1 × RARLAB : </div><div> &nbsp; WinRAR (CVE-2025-6218) </div><div> 1 × D-Link : </div>
<div> &nbsp; Routers (CVE-2022-37055) </div><div> 1 × Array Networks&nbsp; : </div>
<div> &nbsp; ArrayOS AG (CVE-2025-66644) </div><div> 1 × OpenPLC : </div><div> &nbsp; ScadaBR (CVE-2021-26828) </div>
<br><div><br></div></div><br><p></p><p></p><p></p></div></div></div></div></div></div>
</div>]]></content:encoded><pubDate>Mon, 26 Jan 2026 08:16:38 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S4]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s4</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Hausse alarmante des cyberattaques sur les systèmes industriels Cyble, une entreprise de cybersécurité spécialisée dans la cyber threat inteligence, so ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span></span></span></span></span><div><div><p style="margin-bottom:13.3333px;"><strong><span><span><span>Hausse alarmante des cyberattaques sur les systèmes industriels</span></span></span></strong></p></div>
<div><div><div><div><p style="margin-bottom:13.3333px;">Cyble, une entreprise de cybersécurité spécialisée dans la cyber threat inteligence, souligne dans son rapport une explosion des attaques visant les environnements ICS/OT et l’IA. Entre 2020 et 2025, les attaques par ransomware ont augmenté de +355 %, passant d’environ 1400 à près de 6500 incidents. En 2025, 57 nouveaux groupes de ransomware et 27 groupes d’extorsion sont apparus, avec plus de 350 nouvelles variantes identifiées. 2451 vulnérabilités ICS publiées par 152 fournisseurs en un an ont été analysées. Les interfaces HMI et SCADA restent les cibles principales, et l’Europe concentre la majorité des attaques hacktivistes. L’IA accélère les offensives (phishing industriel, malwares adaptatifs), rendant les attaques plus rapides et plus difficiles à détecter.</p><a href="https://cyble.com/resources/research-reports/annual-threat-landscape-report-2025/" title="https://cyble.com/resources/research-reports/annual-threat-landscape-report-2025/" rel="">https://cyble.com/resources/research-reports/annual-threat-landscape-report-2025/</a><br></div>
</div></div></div></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnérabilités connues activement exploitées sur l'année 2025</span></p><p style="margin-bottom:13.3333px;"><span><span><span><span>Cet article présente des statistiques sur les vulnérabilités exploitées en 2025. Sur 884 vulnérabilités exploitées, près de 29 % ont été exploitées le jour même ou avant la publication de leur CVE, contre 23,6 % en 2024.</span></span></span></span></p><p style="margin-bottom:13.3333px;"><a href="https://www.vulncheck.com/blog/state-of-exploitation-2026" title="https://www.vulncheck.com/blog/state-of-exploitation-2026" rel="">https://www.vulncheck.com/blog/state-of-exploitation-2026</a><br></p></div>
<div><p style="margin-bottom:13.3333px;line-height:1;"></p><div><div><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span></span></span></p></div>
</div></div></div></div></div></div><div><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnerability&nbsp;Corner :</span></span><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div>
<div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:144px;"><div><div><p><span>CVE&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:146.25px;"><div><div><p><span>Vendor&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:204.188px;"><div><div><p><span>Product&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:711.812px;"><div><div><p><span>Liens&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-31125" target="_blank" rel="noreferrer noopener"><span>CVE-2025-31125</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:146.25px;"><div><div><p><span>Vite&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:204.188px;"><div><div><p><span>Vitejs&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:711.812px;"><div><div><p><span></span><a href="https://github.com/vitejs/vite/commit/59673137c45ac2bcfad1170d954347c1a17ab949%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-31125" target="_blank" rel="noreferrer noopener"><span>https://github.com/vitejs/vite/commit/59673137c45ac2bcfad1170d954347c1a17ab949, https://nvd.nist.gov/vuln/detail/CVE-2025-31125</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-34026" target="_blank" rel="noreferrer noopener"><span>CVE-2025-34026</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:146.25px;"><div><div><p><span>Versa&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:204.188px;"><div><div><p><span>Concerto&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:711.812px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-34026%2C%20https%3A//security-portal.versa-networks.com/emailbulletins/6830f94328defa375486ff2e" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2025-34026, https://security-portal.versa-networks.com/emailbulletins/6830f94328defa375486ff2e</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-54313" target="_blank" rel="noreferrer noopener"><span>CVE-2025-54313</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:146.25px;"><div><div><p><span>Prettier&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:204.188px;"><div><div><p><span>eslint-config-prettier&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:711.812px;"><div><div><p><span></span><a href="https://github.com/prettier/eslint-config-prettier/issues/339#issuecomment-3090304490%2C%20https://nvd.nist.gov/vuln/detail/CVE-2025-54313%2C%20https://www.npmjs.com/package/eslint-config-prettier?activeTab=versions" target="_blank" rel="noreferrer noopener"><span>https://github.com/prettier/eslint-config-prettier/issues/339#issuecomment-3090304490, https://nvd.nist.gov/vuln/detail/CVE-2025-54313, https://www.npmjs.com/package/eslint-config-prettier?activeTab=versions</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68645" target="_blank" rel="noreferrer noopener"><span>CVE-2025-68645</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:146.25px;"><div><div><p><span>Synacor&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:204.188px;"><div><div><p><span>&nbsp;Zimbra Collaboration Suite (ZCS)&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:711.812px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68645%2C%20https%3A//wiki.zimbra.com/wiki/Security_Center" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2025-68645, https://wiki.zimbra.com/wiki/Security_Center</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20045" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20045</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:146.25px;"><div><div><p><span>Cisco&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:204.188px;"><div><div><p><span>Unified Communications Manager&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:711.812px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20045%2C%20https%3A//sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2026-20045, https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b</span></a><span>&nbsp;</span></p></div>
</div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div>
<div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:375px;"><div><div><p><span>Vendor&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:363px;"><div><div><p><span>Product&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:125.547px;" class="zp-selected-cell"><div><div><p><span>Critical&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:110.422px;"><div><div><p><span>High&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:120.938px;"><div><div><p><span>Medium&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:131px;"><div><div><p><span>Low&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:91px;"><div><div><p><span>Total&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:375px;"><div><div><p><span>EVMAPA&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:363px;"><div><div><p><span>EVMAPA&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:125.547px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:110.422px;"><div><div><p><span>2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:120.938px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:131px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:91px;"><div><div><p><span>3&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:375px;"><div><div><p><span>Rockwell Automation&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:363px;"><div><div><p><span>CompactLogix&nbsp;5370,Verve&nbsp;Asset Manager&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:125.547px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:110.422px;"><div><div><p><span>2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:120.938px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:131px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:91px;"><div><div><p><span>3&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:375px;"><div><div><p><span>Weintek&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:363px;"><div><div><p><span>cMT3072XH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:125.547px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:110.422px;"><div><div><p><span>2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:120.938px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:131px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:91px;"><div><div><p><span>2&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:375px;"><div><div><p><span>AutomationDirect&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:363px;"><div><div><p><span>CLICK Programmable Logic Controller&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:125.547px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:110.422px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:120.938px;"><div><div><p><span>2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:131px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:91px;"><div><div><p><span>2&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:375px;"><div><div><p><span>Hubitat&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:363px;"><div><div><p><span>Elevation C3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:125.547px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:110.422px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:120.938px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:131px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:91px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:375px;"><div><div><p><span>Delta Electronics&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:363px;"><div><div><p><span>DIAView&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:125.547px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:110.422px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:120.938px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:131px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:91px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:375px;"><div><div><p><span>Johnson Controls Inc.&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:363px;"><div><div><p><span>iSTAR Configuration Utility (ICU) tool&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:125.547px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:110.422px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:120.938px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:131px;"><div><div><p><span>0&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:91px;"><div><div><p><span>1&nbsp;</span></p></div>
</div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p></div>
<div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Vendor&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Product&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVE&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Score&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Severity&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EPSS&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Percentile&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CWE&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EVMAPA&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EVMAPA&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-54816" target="_blank" rel="noreferrer noopener"><span>CVE-2025-54816</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.4&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Hubitat&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Elevation C3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1201" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1201</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/639.html" target="_blank" rel="noreferrer noopener"><span>CWE-639</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Weintek&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>cMT3072XH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14750" target="_blank" rel="noreferrer noopener"><span>CVE-2025-14750</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/472.html" target="_blank" rel="noreferrer noopener"><span>CWE-472</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Weintek&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>cMT3072XH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14751" target="_blank" rel="noreferrer noopener"><span>CVE-2025-14751</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/620.html" target="_blank" rel="noreferrer noopener"><span>CWE-620</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Rockwell Automation&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Verve Asset Manager&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14377" target="_blank" rel="noreferrer noopener"><span>CVE-2025-14377</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.9&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.027%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.827%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/312.html" target="_blank" rel="noreferrer noopener"><span>CWE-312</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Delta Electronics&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>DIAView&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-0975" target="_blank" rel="noreferrer noopener"><span>CVE-2026-0975</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.052%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>16.310%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/77.html" target="_blank" rel="noreferrer noopener"><span>CWE-77</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EVMAPA&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EVMAPA&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-53968" target="_blank" rel="noreferrer noopener"><span>CVE-2025-53968</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/307.html" target="_blank" rel="noreferrer noopener"><span>CWE-307</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EVMAPA&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EVMAPA&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-55705" target="_blank" rel="noreferrer noopener"><span>CVE-2025-55705</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/613.html" target="_blank" rel="noreferrer noopener"><span>CWE-613</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Rockwell Automation&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Verve Asset Manager&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14376" target="_blank" rel="noreferrer noopener"><span>CVE-2025-14376</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.2&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.013%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.619%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/922.html" target="_blank" rel="noreferrer noopener"><span>CWE-922</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Johnson Controls Inc.&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>iSTAR Configuration Utility (ICU) tool&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-26386" target="_blank" rel="noreferrer noopener"><span>CVE-2025-26386</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/121.html" target="_blank" rel="noreferrer noopener"><span>CWE-121</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Rockwell Automation&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CompactLogix 5370&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11743" target="_blank" rel="noreferrer noopener"><span>CVE-2025-11743</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.033%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.095%&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/1284.html" target="_blank" rel="noreferrer noopener"><span>CWE-1284</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>AutomationDirect&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CLICK Programmable Logic Controller&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-25051" target="_blank" rel="noreferrer noopener"><span>CVE-2025-25051</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/256.html" target="_blank" rel="noreferrer noopener"><span>CWE-256</span></a><span>&nbsp;</span></p></div>
</div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>AutomationDirect&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CLICK Programmable Logic Controller&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67652" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67652</span></a><span>&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.1&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div>
</div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/261.html" target="_blank" rel="noreferrer noopener"><span>CWE-261</span></a><span>&nbsp;</span></p></div>
</div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br> &nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-juin-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de juin 2025</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 8&nbsp;janvier&nbsp;2026 :&nbsp;Définir&nbsp;sa&nbsp;stratégie&nbsp;de&nbsp;détection&nbsp;en&nbsp;environnement&nbsp;industriel, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/591f0891-1fda-4029-9812-497ae82c48ff%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;février&nbsp;2026 :&nbsp;Construire&nbsp;le plan de protection de&nbsp;ses&nbsp;installations&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/ff70c30b-3a81-44d5-a118-8541407e5699%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 5 mars&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;échanges&nbsp;de&nbsp;fichiers&nbsp;entre les zones&nbsp;industrielles&nbsp;et IT, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/7abb2065-6cf1-41bd-956a-9eaaf4655853%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
</div><br><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div>]]></content:encoded><pubDate>Mon, 26 Jan 2026 07:57:54 +0100</pubDate></item></channel></rss>