<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.fortress-cybersecurity.fr/blogs/newsletter/feed" rel="self" type="application/rss+xml"/><title>Site Institutionnel - Blog , newsletter</title><description>Site Institutionnel - Blog , newsletter</description><link>https://www.fortress-cybersecurity.fr/blogs/newsletter</link><lastBuildDate>Sun, 10 May 2026 22:32:04 +0200</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S19]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s19</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/> Lotus Wiper : une nouvelle menace visant le secteur de l'énergie au Venezuela Kaspersky analyse Lotus Wiper, un malware destructeur ciblant le secteu ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><b></b></div>
</div></div><span><span><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><b></b></div>
</div></div><p><strong><span>Lotus Wiper : une nouvelle menace visant le secteur de l'énergie au Venezuela</span></strong><br/></p><p><span><span><span>Kaspersky analyse Lotus Wiper, un malware destructeur ciblant le secteur énergie/utilities au Venezuela fin 2025, dans un contexte de tensions géopolitiques dans la région des Caraïbes. À la différence d’un ransomware, l’attaque ne vise pas l’extorsion mais l’effacement pur des systèmes : modification aléatoire des mots de passe utilisateurs, désactivation des comptes locaux et des interfaces réseau, suppression des points de restauration, écrasement des disques, effacement des journaux et suppression massive de fichiers. À l’image de NotPetya ou d’HermeticWiper, Lotus Wiper rappelle que toutes les attaques destructrices ne poursuivent pas un objectif financier : certaines s’inscrivent dans des logiques géopolitiques où la finalité est la destruction des systèmes et la perturbation durable de l’activité.</span></span><br/></span></p><p><a href="https://securelist.com/tr/lotus-wiper/119472/" title="https://securelist.com/tr/lotus-wiper/119472/" rel="">https://securelist.com/tr/lotus-wiper/119472/</a><br/></p><p><span><br/></span></p><p><strong><span>NIST/NCCoE : mieux voir l’OT pour mieux le protéger</span></strong><br/></p><p><span><span><span></span></span></span></p><div><p></p></div></span></span><p></p><div><p>Dans cet article de GovConWire, la nouvelle initiative du NIST/NCCoE, un organisme américain de référence en cybersécurité et son centre chargé de produire des guides pratiques, met l'accent sur la visibilité dans les environnements industriels. L’idée est simple : dans beaucoup de ces environnements, on ne sait pas toujours précisément quels équipements sont présents, comment ils communiquent, ni si une activité anormale est en cours. L’article montre que ce manque de visibilité n’est pas seulement un problème technique. Il peut avoir des impacts directs sur la production, la sécurité des sites, la conformité et la résilience des infrastructures critiques.</p></div><p><a href="https://www.govconwire.com/articles/chuck-brooks-govcon-expert-nist-cybersecurity-visibility-project" title="https://www.govconwire.com/articles/chuck-brooks-govcon-expert-nist-cybersecurity-visibility-project" rel="">https://www.govconwire.com/articles/chuck-brooks-govcon-expert-nist-cybersecurity-visibility-project</a><br/></p><p></p><p><br/></p><p><strong><span>Mythos / Project Glasswing : les environnements industriels encore trop peu intégrés</span></strong></p><p>Dans cet article de Nextgov/FCW, on parle de Mythos, le modèle cyber d’Anthropic, utilisé dans Project Glasswing pour aider à identifier et corriger des vulnérabilités logicielles.<span><span></span></span></p><div><p>L’article explique que plusieurs acteurs du monde industriel estiment avoir été écartés au départ, alors que leurs infrastructures sont directement exposées à ce type de risque. Il rappelle aussi que corriger une faille sur un site industriel est souvent plus complexe que dans un environnement informatique classique : certains équipements sont anciens, difficiles à arrêter, et les mises à jour doivent être priorisées avec attention.</p></div><p></p><p><a href="https://www.nextgov.com/cybersecurity/2026/05/operational-technology-providers-are-feeling-annoyance-exclusion-anthropics-mythos-rollout-sources-say/413309/" title="https://www.nextgov.com/cybersecurity/2026/05/operational-technology-providers-are-feeling-annoyance-exclusion-anthropics-mythos-rollout-sources-say/413309/" rel="">https://www.nextgov.com/cybersecurity/2026/05/operational-technology-providers-are-feeling-annoyance-exclusion-anthropics-mythos-rollout-sources-say/413309/</a><br/></p><p><br/></p><div><p></p><div><div><p><span style="font-weight:bold;"><span>Vulnerability Corner :</span></span><span>&nbsp;</span></p></div><div><p><span>Liste des Known Exploited Vulnerabilities (KEV) publiés par l'agence de cybersécurité américaine CISA la semaine dernière :&nbsp;&nbsp;</span></p></div><div><div><table border="1"><tbody><tr><td style="vertical-align:top;width:192px;" class="zp-selected-cell"><div><div><p><span style="font-weight:bold;">CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:199.25px;"><div><div><p><span style="font-weight:bold;">Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:277.047px;"><div><div><p><span style="font-weight:bold;">Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:608.953px;"><div><div><p><span style="font-weight:bold;">Liens&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:192px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-0300" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-0300</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:199.25px;"><div><div><p><span>Palo Alto Networks&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:277.047px;"><div><div><p><span>PAN-OS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:608.953px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-0300%2C%20https%3A//security.paloaltonetworks.com/CVE-2026-0300" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>https://nvd.nist.gov/vuln/detail/CVE-2026-0300, https://security.paloaltonetworks.com/CVE-2026-0300</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:192px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-42208" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-42208</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:199.25px;"><div><div><p><span>BerriAI&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:277.047px;"><div><div><p><span>LiteLLM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:608.953px;"><div><div><p><span></span><a href="https://github.com/BerriAI/litellm/security/advisories/GHSA-r75f-5x8p-qvmc%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-42208" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>https://github.com/BerriAI/litellm/security/advisories/GHSA-r75f-5x8p-qvmc, https://nvd.nist.gov/vuln/detail/CVE-2026-42208</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:192px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-6973" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-6973</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:199.25px;"><div><div><p><span>Ivanti&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:277.047px;"><div><div><p><span>Endpoint Manager Mobile (EPMM)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:608.953px;"><div><div><p><span></span><a href="https://hub.ivanti.com/s/article/May-2026-Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-Multiple-CVEs?language=en_US%2C%20https%3A%2F%2Fnvd.nist.gov%2Fvuln%2Fdetail%2FCVE-2026-6973" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>https://hub.ivanti.com/s/article/May-2026-Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-Multiple-CVEs?language=en_US, https://nvd.nist.gov/vuln/detail/CVE-2026-6973</span></span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p><span>&nbsp;</span></p></div><div><p><span style="font-weight:bold;"><span>Vulnérabilités de composants de systèmes industriels :&nbsp;</span></span><span>&nbsp;</span></p></div><div><p><span>Source : ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div><div><div><table border="1"><tbody><tr><td style="vertical-align:top;width:82px;"><div><div><p><span style="font-weight:bold;">Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span style="font-weight:bold;">Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span style="font-weight:bold;">Critical&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span style="font-weight:bold;">High&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span style="font-weight:bold;">Medium&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span style="font-weight:bold;">Low&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span style="font-weight:bold;">Total&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Johnson Controls Inc.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>CEM AC2000&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;" class="zp-selected-cell"><div><div><p><span>MAXHUB&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>MAXHUB Pivot client application&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p><span>&nbsp;</span></p></div><div><p><span>&nbsp;</span></p></div><div><p><span>Liste complète triée par CVSSv3 Score :&nbsp;</span></p></div><div><div><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;" class="zp-selected-cell"><div><div><p><span style="font-weight:bold;">Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span style="font-weight:bold;">Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span style="font-weight:bold;">CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span style="font-weight:bold;">CVSSv3 Score&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span style="font-weight:bold;">CVSSv3 Severity&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span style="font-weight:bold;">EPSS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span style="font-weight:bold;">Percentile&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span style="font-weight:bold;">CWE&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Johnson Controls Inc.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CEM AC2000&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21661" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-21661</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.7&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.014%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.463%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/427.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-427</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>MAXHUB&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MAXHUB Pivot client application&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-6411" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-6411</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/327.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-327</span></span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p><span>&nbsp;</span></p></div><div><p><span>-----&nbsp;<br/></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br/>&nbsp;</span></p></div><div><p><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-d-avril-2026" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois d'avril 2026</span></a><span>&nbsp;</span></p></div><div><p><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div><div><p><span>- 4 juin 2026 : Gérer les incidents cyber en environnement industriel​, inscription </span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p><span>- 2 juillet 2026 : Gérer les vulnérabilités en environnement industriel​​, inscription </span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p><span>- 3 septembre 2026 : Mettre en place le plan de contrôle cyber de ses installations industriels​​, inscription </span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p><span>- 1 octobre 2026 : Sécuriser les accès à distance et de télémaintenance des actifs industriels, inscription </span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p><span>- 5 novembre 2026 : Protéger les endpoints dans les zones industrielles, inscription </span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p><span>- 3 décembre 2026 : Protéger les réseaux mobiles privés 5G, inscription </span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div></div><br/><p></p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 10 May 2026 22:23:56 +0200</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S18]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s18</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/> ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><b></b></div>
</div></div><span><span><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><b></b></div>
</div></div><p><strong>Le secteur manufacturier, cible prioritaire d'une menace ransomware qui se concentre</strong><br/></p><p><span><span>Publié par Resilience (assureur cyber), ce rapport croise des données de sinistralité internes (mars 2021 – février 2026) corélées avec des sources sectorielles externes pour dresser un état des lieux de la cybersécurité dans l'industrie manufacturière. Le secteur est la cible la plus attaquée au monde pour la cinquième année consécutive : les incidents ransomware y ont bondi de 61 % en 2025. Sur le portefeuille analysé, le ransomware représente 90 % des pertes totales, alors qu'il ne constitue que 12 % du volume de sinistres. Le principal facteur de perte n'est pas l'absence de protection, mais sa mauvaise configuration : les défauts de paramétrage du MFA (authentification multifacteur) sont responsables de 26 % des pertes, soit davantage que l'absence totale de MFA (8 %). La convergence IT/OT, l'ancienneté des systèmes industriels et la sous-dotation chronique des budgets sécurité constituent les vulnérabilités structurelles sous-jacentes.</span><br/></span></p><p><span><span><a href="https://4526209.fs1.hubspotusercontent-na1.net/hubfs/4526209/Manufacturing%20Report.pdf">https://4526209.fs1.hubspotusercontent-na1.net/hubfs/4526209/Manufacturing%20Report.pdf</a><br/></span></span></p><p><span><br/></span></p><p><strong>RDP/VNC exposés sur internet : l'accès distant, angle mort de la sécurité des systèmes cyber-physiques</strong><br/></p><p><span><span><span>Les chercheurs du Vedere Labs de Forescout recensent plus de 1,8 million de serveurs RDP et 1,6 million de serveurs VNC exposés sur internet, dont 18 % des serveurs RDP tournent sur des versions Windows en fin de vie, et plus de 19 000 restent vulnérables à la faille BlueKeep (CVE-2019-0708). Près de 60 000 serveurs VNC n'ont aucune authentification activée, dont 670 donnent un accès direct à des panneaux de contrôle OT/ICS. Sur le plan des acteurs de la menace cyber, des groupes tels que&nbsp; <span>Cyber Army of Russia Reborn (CARR), NoName057(16), Z-Pentest (composé de plusieurs groupes d'hacktivistes et Sector16)&nbsp;</span>utilisent des outils de scan ciblant spécifiquement RDP, VNC et les protocoles OT, tandis que le botnet Redheberg a infecté près de 40 000 serveurs VNC exposés depuis février.</span><br/></span></span></p><p><span><a href="https://www.forescout.com/blog/rdp-security-cps-threats-spark-need-for-secure-remote-access/">https://www.forescout.com/blog/rdp-security-cps-threats-spark-need-for-secure-remote-access/</a></span></p><p><br/></p><p><strong>Adapter le Zero Trust aux environnements OT : contraintes spécifiques et recommandations pratiques</strong></p><p><span><span>Ce guide interagences (CISA, DOE, FBI) pose un constat fondamental : le Zero Trust (ZT) ne peut être transposé tel quel des environnements IT vers l'OT, en raison des exigences de disponibilité continue, des systèmes legacy non patchables et des capacités de journalisation souvent inexistantes. Structuré selon le cadre NIST CSF 2.0 (Gouverner, Identifier, Protéger, Détecter, Répondre, Récupérer), il détaille des mesures concrètes : segmentation réseau et microsegmentation, gestion des identités et accès adaptée aux protocoles propriétaires OT, sécurisation des accès distants via jump hosts avec MFA, et surveillance passive pour ne pas perturber les systèmes. Un point saillant : l'IT et l'OT ne doivent pas partager de domaines ou annuaires Active Directory, leur convergence étant précisément le vecteur exploité par des acteurs comme Volt Typhoon pour pivoter vers les réseaux industriels.</span><br/></span></p><p><a href="https://www.cisa.gov/sites/default/files/2026-04/joint-guide-adapting-zero-trust-principles-to-operational-technology_508c.pdf">https://www.cisa.gov/sites/default/files/2026-04/joint-guide-adapting-zero-trust-principles-to-operational-technology_508c.pdf</a><br/></p><p><br/></p><p><span><span style="font-weight:bold;">Cyber-Process Hazard Analysis (PHA) par KPMG comme méthode structurée pour bâtir la résilience des systèmes industriels&nbsp;</span></span><br/></p><p><span><span><span>Face à une menace ransomware qui a quintuplé sur les réseaux industriels entre 2018 et 2020, le secteur industriel reste largement sous-préparé, malgré une prise de conscience croissante des dirigeants. Le document distingue la cyber-résilience de la cybersécurité classique : là où la seconde vise à bloquer les attaques, la première garantit la continuité des fonctions critiques même après compromission. La méthode porposé par la cabinet KPMG désignée par cyber-PHA (Process Hazard Analysis), est une transposition au domaine cyber d'une démarche d'analyse de risques industriels en six phases, de la définition du périmètre jusqu'au plan de remédiation priorisé. Cette approche est particulièrement adaptée aux environnements IT/OT convergents, où les vulnérabilités de PLCs, HMIs et systèmes SCADA peuvent entraîner des conséquences physiques réelles. L'étude de cas illustre son déploiement concret dans une organisation multi-sites sans référentiel de sécurité unifié, aboutissant à une architecture réseau segmentée et un programme cyber standardisé sur le périmètre industriel.</span><br/></span></span></p><p><span><span><span>Une méthode qui rapelle la démarche de classification des actifs industriels publiées par l'ANSSI.</span></span></span></p><p><a href="https://assets.kpmg.com/content/dam/kpmgsites/my/pdf/2022/08/pathway_to_industrial_cyber_resilience.pdf.coredownload.inline.pdf">https://assets.kpmg.com/content/dam/kpmgsites/my/pdf/2022/08/pathway_to_industrial_cyber_resilience.pdf.coredownload.inline.pdf</a><br/></p><p><br/></p><p><span style="font-size:20px;"><strong>Sur le volet offreurs de solutions (nouvelle section)</strong></span><br/></p><p><strong>Sennin, la plateforme de TXOne pour transformer l'évaluation des risques OT en protection opérationnelle concrète</strong><br/></p><p><span><span><span>TXOne Networks a lancé la famille de produits Sennin, une suite d'outils d'évaluation et d'orchestration conçue pour combler le fossé récurant entre l'identification des risques OT et leur traitement effectif. SenninRecon est un capteur réseau passif qui surveille plus de 180 protocoles industriels et produit une vue des risques priorisée selon la méthodologie VSAR de TXOne, intégrant exploitabilité réelle et contexte opérationnel ; SenninOne est la plateforme de gouvernance d'entreprise qui traduit ces résultats en politiques de sécurité actionnables, liées aux produits de protection réseau, endpoint et inspection de TXOne. L'enjeu central est structurel : la plupart des organisations savent déjà identifier leurs risques industriels, mais peinent à les corriger sans interrompre la production, Sennin est précisément conçu pour rendre cette transition opérationnellement acceptable</span><br/></span></span></p><p><span><span><span><a href="https://www.txone.com/news/sennin-ot-strategic-governance/">https://www.txone.com/news/sennin-ot-strategic-governance/</a><br/></span></span></span></p><p><span><span><span><br/></span></span></span></p><p><strong>Tenable intègre nativement la découverte OT à sa plateforme d'exposition pour unifier la visibilité IT/OT sans déploiement matériel</strong><br/></p><p><span><span><span><span>Tenable a lancé un moteur de découverte d'actifs OT intégré directement à sa plateforme Tenable One, sans matériel spécialisé ni agent supplémentaire requis, permettant aux équipes de sécurité d'obtenir immédiatement une visibilité sur les systèmes cyber-physiques, OT, IoT et shadow IT. Les premiers clients en accès anticipé, dans des secteurs aussi variés que l'hôtellerie, la finance ou l'éducation, ont découvert entre 100 et 1 000 actifs OT/IoT inconnus dès le premier déploiement, certains présentant des vulnérabilités critiques. L'enjeu est direct : 45 % des compromissions OT modernes trouvent leur origine dans des environnements IT, et cette nouvelle capacité permet de consolider en une vue unifiée l'exposition cyber-physique aux côtés des domaines cloud, identité et IA.</span><br/></span></span></span></p><p><span><span><span><a href="https://www.tenable.com/press-releases/tenable-expands-exposure-management-with-instant-ot-discovery-to-secure-cyber-physical-systems">https://www.tenable.com/press-releases/tenable-expands-exposure-management-with-instant-ot-discovery-to-secure-cyber-physical-systems</a></span></span></span></p><p></p><div><p><span style="font-weight:bold;"><span><br/></span></span></p><p><span style="font-weight:bold;font-size:20px;">Vulnerability&nbsp;Corner :</span>&nbsp;</p></div>
<div><p><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div>
<p></p><table border="1"><tbody><tr><td style="vertical-align:top;width:169px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:161.078px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:386.938px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:599.062px;"><div><p><strong>Liens&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:169px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1708" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CVE-2024-1708</span></a>&nbsp;</p></div></td><td style="vertical-align:top;width:161.078px;"><div><p>ConnectWise&nbsp;</p></div></td><td style="vertical-align:top;width:386.938px;"><div><p>ScreenConnect&nbsp;</p></div></td><td style="vertical-align:top;width:599.062px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1708%2C%20https%3A//www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">https://nvd.nist.gov/vuln/detail/CVE-2024-1708, https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8</span></a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:169px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32202" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CVE-2026-32202</span></a>&nbsp;</p></div></td><td style="vertical-align:top;width:161.078px;"><div><p>Microsoft&nbsp;</p></div></td><td style="vertical-align:top;width:386.938px;"><div><p>Windows&nbsp;</p></div></td><td style="vertical-align:top;width:599.062px;"><div><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-32202%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-32202" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-32202, https://nvd.nist.gov/vuln/detail/CVE-2026-32202</span></a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:169px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-41940" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CVE-2026-41940</span></a>&nbsp;</p></div></td><td style="vertical-align:top;width:161.078px;"><div><p>WebPros&nbsp;</p></div></td><td style="vertical-align:top;width:386.938px;"><div><p>cPanel &amp; WHM and WP2 (WordPress Squared)&nbsp;</p></div></td><td style="vertical-align:top;width:599.062px;"><div><p><a href="https://docs.cpanel.net/release-notes/release-notes/%2C%20https%3A//docs.wpsquared.com/changelogs/versions/changelog/#13617%2C%20https://nvd.nist.gov/vuln/detail/CVE-2026-41940" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">https://docs.cpanel.net/release-notes/release-notes/, https://docs.wpsquared.com/changelogs/versions/changelog/#13617, https://nvd.nist.gov/vuln/detail/CVE-2026-41940&quot;, https://support.cpanel.net/hc/en-us/articles/40073787579671-cPanel-WHM-Security-Update-04-28-2026</span></a>&nbsp;</p></div></td></tr></tbody></table><div></div>
<p></p><div><p><span>&nbsp;</span></p></div><div><p><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div>
<div><p><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div>
<p></p></span></span><table border="1"><tbody><tr><td style="vertical-align:top;width:82px;"><div><p><strong>Ven</strong><strong>dor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Critical&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>High&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Medium&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Low&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Total&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>ABB&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>7&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>3&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>11&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>NSA&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr></tbody></table><span><span><div></div>
<p></p><div><p><span>&nbsp;</span></p></div><div><p><span>&nbsp;</span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</p></div>
<p></p><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><p>V<strong>endor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVSSv3 Score&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVSSv3 Severity&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>EPSS&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CWE&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>ABB&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>ABB&nbsp;Edgenius&nbsp;Management Portal&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><span style="text-decoration:underline;">CVE-2025-10571</span>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.6&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/288.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CWE-288</span></a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>ABB&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>ABB Ability Symphony Plus Engineering&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><span style="text-decoration:underline;">CVE-2023-5869</span>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><div><p>8.8&nbsp;</p></div>
<div><p>&nbsp;</p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p>HIGH&nbsp;</p></div>
<div><p>&nbsp;</p></div></div></td><td style="vertical-align:top;width:72px;"><div><p>0.1%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/190.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CWE-190</span></a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>ABB&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>ABB Ability Symphony Plus Engineering&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><span style="text-decoration:underline;">CVE-2024-7348</span>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><div><p>HIGH&nbsp;</p></div>
<div><p>&nbsp;</p></div></div></td><td style="vertical-align:top;width:72px;"><div><p>73%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/367.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CWE-367</span></a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>ABB&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>ABB AWIN Gateways&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://www.cve.org/CVERecord?id=CVE-2025-13779" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CVE-2025-13779</span></a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CWE-306</span></a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>ABB&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>ABB Ability OPTIMAX&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://www.cve.org/CVERecord?id=CVE-2025-14510" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CVE-2025-14510</span></a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.1&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/303.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CWE-303</span></a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p>ABB&nbsp;</p></div>
<div><p>&nbsp;</p></div></div></td><td style="vertical-align:top;width:72px;"><div><p>ABB AWIN Gateways&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://www.cve.org/CVERecord?id=CVE-2025-13777" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CVE-2025-13777</span></a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><div><p>HIGH&nbsp;</p></div>
<div><p>&nbsp;</p></div></div></td><td style="vertical-align:top;width:72px;"><div><p>8%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/294.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CWE-294</span></a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>ABB&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>ABB Ability Symphony Plus Engineering&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><span style="text-decoration:underline;">CVE-2024-0985</span>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><div><p>8&nbsp;</p></div>
<div><p><span style="text-decoration:underline;"></span>&nbsp;</p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p>HIGH&nbsp;</p></div>
<div><p>&nbsp;</p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p>73%&nbsp;</p></div>
<div><p>&nbsp;</p></div></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/271.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CWE-271</span></a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>ABB&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>ABB Ability Symphony Plus Engineering&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://www.cve.org/CVERecord?id=CVE-2023-39417" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CVE-2023-39417</span></a><span style="text-decoration:underline;"></span>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.6%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/89.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CWE-89</span></a><span style="text-decoration:underline;"></span>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p>ABB&nbsp;</p></div>
<div><p>&nbsp;</p></div></div></td><td style="vertical-align:top;width:72px;"><div><p>ABB System 800xA, Symphony Plus IEC 61850&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><span style="text-decoration:underline;">CVE-</span><a href="https://www.cve.org/CVERecord?id=CVE-2025-3756" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">2025</span></a><span style="text-decoration:underline;">-3756</span>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/1284.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CWE-1284</span></a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>ABB&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>ABB AWIN Gateways&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><span style="text-decoration:underline;">CVE-2025-13778</span>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CWE-306</span></a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>NSA&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>GRASSMARLIN&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-6807" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CVE-2026-6807</span></a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>5.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.5%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/611.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CWE-611</span></a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>ABB&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>PCM600&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://www.cve.org/CVERecord?id=CVE-2018-1002208" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CVE-2018-1002208</span></a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>4.4&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.6%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/22.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;">CWE-22</span></a>&nbsp;</p></div></td></tr></tbody></table><div><div></div>
<div><p><span>&nbsp;</span></p></div><div><p>-----&nbsp;<br/><span style="font-weight:bold;font-size:20px;">Actualité Fortress Cybersecurity&nbsp;</span><br/></p></div>
<div><p><span><span><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-mars-2027" target="_blank" rel="">- Bilan des Known Exploited Vulnerabilities du mois de mars 202</a><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-mars-2027" target="_blank" rel="">6</a>&nbsp;</span><br/></span></p></div>
<div><p><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div>
<div><p><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div>
<div><p><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
</div><p><br/></p><p><span><span><br/></span></span></p></span></span></div></div>
</div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 03 May 2026 19:34:54 +0200</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S17]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s17</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Cyber-risques 2026 par un assureur : Ce qu’il faut retenir&nbsp; Le rapport met en avant une activité cyber en hausse, avec des demandes d’indemnisatio ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><b></b></div></div></div><span><span><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><b></b></div></div></div><p><strong><span>Cyber-risques 2026 par un assureur : Ce qu’il faut retenir&nbsp;</span></strong></p><p><span><span>Le rapport met en avant une activité cyber en hausse, avec des demandes d’indemnisation en hausse de 40%. Les incidents déclarés concernent surtout les fuites de données et les attaques par extorsion. Les ransomwares restent très présent, puisqu’ils représentent 19% des incidents déclarés entre 2022 et 2025. Même si les attaques par ransomware continuent, les paiements de rançon baissent d’environ 44%. Cette baisse s’explique par de meilleures sauvegardes, une réponse plus rapide et des négociations mieux encadrées. Le rapport montre aussi que le facteur humain reste un point faible majeur. Le phishing, les fraudes par email, l’usurpation d’identité, les SMS frauduleux et les appels piégés restent des moyens simples et efficaces pour contourner les protections. Certains groupes ransomware ressortent particulièrement, comme Akira, lié à 38,8% des cas identifiés, et Qilin, lié à 14,2%. Cela montre qu’une partie importante des attaques est concentrée autour de quelques acteurs. Un autre point important concerne les incidents en chaîne : une faille chez un fournisseur ou un prestataire peut rapidement toucher plusieurs entreprises en même temps.</span></span></p><p><a href="https://cowbell.insure/wp-content/uploads/pdfs/CB-US-Media-CyberRoundup-2026ClaimsReport.pdf" title="https://cowbell.insure/wp-content/uploads/pdfs/CB-US-Media-CyberRoundup-2026ClaimsReport.pdf" rel="">https://cowbell.insure/wp-content/uploads/pdfs/CB-US-Media-CyberRoundup-2026ClaimsReport.pdf</a><br/></p><p><br/></p><p><strong>Analyse du malware ZionSiphon</strong><br/></p><p></p><p>L’article analyse ZionSiphon, un malware visant les environnements OT liés au traitement de l’eau et au dessalement en Israël.<span><span></span></span></p><p> Il se distingue en recherchant des protocoles industriels comme Modbus, DNP3 et S7comm et en ciblant uniquement des plages d’IP israéliennes. Néanmoins, le malware reste inoffensif :&nbsp;</p><ul><li>L’un des contrôles renvoie toujours faux et le malware finit par s’autodétruire.</li><li>Les paquets DNP3 et S7comm ne sont pas correctement formés</li></ul><p>Malgré ces limites, il illustre une tendance préoccupante, les acteurs malveillants commencent à expérimenter des attaques cyber-physiques contre des infrastructures critiques civiles.</p></span></span><p></p><p><a href="https://www.darktrace.com/blog/inside-zionsiphon-darktraces-analysis-of-ot-malware-targeting-israeli-water-systems" title="https://www.darktrace.com/blog/inside-zionsiphon-darktraces-analysis-of-ot-malware-targeting-israeli-water-systems" rel="">https://www.darktrace.com/blog/inside-zionsiphon-darktraces-analysis-of-ot-malware-targeting-israeli-water-systems</a><br/></p><p><br/></p><p><span><span></span></span></p><p></p><p></p><p><strong>Moins de données du NIST sur les vulnérabilités</strong></p><p>Cet article explique pourquoi le NIST réduit les informations fournies sur les vulnérabilités informatiques (CVE). Cette décision est due à un manque de budget, une baisse des effectifs et un nombre de signalements trop élevé. Désormais, le NIST analyse uniquement les failles de sécurité les plus critiques. Ce changement oblige donc les équipes de cybersécurité à s'adapter rapidement. Elles doivent désormais travailler avec moins de données fournies par le NIST pour protéger leurs systèmes.<br/></p><p><a href="https://www.darkreading.com/threat-intelligence/nist-cutbacks-nvd-handling-impacts-cyber-teams" title="https://www.darkreading.com/threat-intelligence/nist-cutbacks-nvd-handling-impacts-cyber-teams" rel="">https://www.darkreading.com/threat-intelligence/nist-cutbacks-nvd-handling-impacts-cyber-teams</a><br/></p><p><br/></p><p><span><span></span></span></p><p></p><p></p><p><strong>Exploitation des convertisseurs série-Ethernet dans les infrastructures critiques</strong></p><p>Dans cet article, Forescout (société de cybersecurité) détaille les failles de sécurité des convertisseurs Série-vers-Ethernet, massivement utilisés dans les infrastructures critiques (énergie, santé, industrie). Des chercheurs ont découvert 22 nouvelles vulnérabilités chez les constructeurs Lantronix et Silex, permettant des prises de contrôle à distance ou le sabotage de données. Ces appareils servent souvent de passerelles pour&nbsp; manipuler des équipements industriels ou paralyser des réseaux électriques En 2015, une cyberattaque contre l'Ukraine a délibérément corrompu le micrologiciel de plusieurs convertisseurs série-IP, rendant ainsi les sous-stations électriques inopérantes à distance. En 2025, ces appareils ont de nouveau été pris pour cible au sein du réseau électrique polonais.<br/></p><p><a href="https://www.forescout.com/blog/exploiting-serial-to-ethernet-converters-in-critical-infrastructure/" title="https://www.forescout.com/blog/exploiting-serial-to-ethernet-converters-in-critical-infrastructure/" rel="">https://www.forescout.com/blog/exploiting-serial-to-ethernet-converters-in-critical-infrastructure/</a><br/></p><p><span style="font-weight:bold;">&nbsp;</span><br/></p><p></p><p></p><p></p><p></p><div><p style="margin-bottom:13.3333px;"></p><div><div><p><span style="font-weight:bold;"><span>Vulnerability&nbsp;Corner :</span></span><span>&nbsp;</span></p></div><div><p><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div><div><div><table border="1"><tbody><tr><td style="vertical-align:top;width:164px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.875px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:264.609px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:774.391px;"><div><div><p><span>Liens&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:164px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27351" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2023-27351</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.875px;"><div><div><p><span>PaperCut&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:264.609px;"><div><div><p><span>NG/MF&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:774.391px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27351%2C%20https%3A//www.papercut.com/kb/Main/PO-1216-and-PO-1219" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>https://nvd.nist.gov/vuln/detail/CVE-2023-27351, https://www.papercut.com/kb/Main/PO-1216-and-PO-1219</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:164px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27199" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2024-27199</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.875px;"><div><div><p><span>JetBrains&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:264.609px;"><div><div><p><span>TeamCity&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:774.391px;"><div><div><p><span></span><a href="https://blog.jetbrains.com/teamcity/2024/03/additional-critical-security-issues-affecting-teamcity-on-premises-cve-2024-27198-and-cve-2024-27199-update-to-2023-11-4-now/%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2024-27199%2C%20https%3A//www.jetbrains.com/privacy-security/issues-fixed/" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>https://blog.jetbrains.com/teamcity/2024/03/additional-critical-security-issues-affecting-teamcity-on-premises-cve-2024-27198-and-cve-2024-27199-update-to-2023-11-4-now/, https://nvd.nist.gov/vuln/detail/CVE-2024-27199, https://www.jetbrains.com/privacy-security/issues-fixed/</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:164px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-2749" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2025-2749</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.875px;"><div><div><p><span>Kentico&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:264.609px;"><div><div><p><span>Kentico Xperience&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:774.391px;"><div><div><p><span></span><a href="https://devnet.kentico.com/download/hotfixes%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-2749" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>https://devnet.kentico.com/download/hotfixes, https://nvd.nist.gov/vuln/detail/CVE-2025-2749</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:164px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-32975" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2025-32975</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.875px;"><div><div><p><span>Quest&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:264.609px;"><div><div><p><span>KACE Systems Management Appliance (SMA)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:774.391px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-32975%2C%20https%3A//support.quest.com/kb/4379499/quest-response-to-kace-sma-vulnerabilities-cve-2025-32975-cve-2025-32976-cve-2025-32977-cve-2025-32978" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>https://nvd.nist.gov/vuln/detail/CVE-2025-32975, https://support.quest.com/kb/4379499/quest-response-to-kace-sma-vulnerabilities-cve-2025-32975-cve-2025-32976-cve-2025-32977-cve-2025-32978</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:164px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48700" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2025-48700</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.875px;"><div><div><p><span>Synacor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:264.609px;"><div><div><p><span>Zimbra Collaboration Suite (ZCS)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:774.391px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48700%2C%20https%3A//wiki.zimbra.com/wiki/Zimbra_Security_Advisories" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>https://nvd.nist.gov/vuln/detail/CVE-2025-48700, https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:164px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20122" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-20122</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.875px;"><div><div><p><span>Cisco&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:264.609px;"><div><div><p><span>Catalyst SD-WAN Manger&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:774.391px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20122%2C%20https%3A//sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v%2C%20https%3A//www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems%2C%20https%3A//www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>https://nvd.nist.gov/vuln/detail/CVE-2026-20122, https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v, https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems, https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:164px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20128" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-20128</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.875px;"><div><div><p><span>Cisco&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:264.609px;"><div><div><p><span>Catalyst SD-WAN Manager&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:774.391px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20128%2C%20https%3A//sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v%2C%20https%3A//www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems%2C%20https%3A//www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>https://nvd.nist.gov/vuln/detail/CVE-2026-20128, https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v, https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems, https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:164px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20133" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-20133</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.875px;"><div><div><p><span>Cisco&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:264.609px;"><div><div><p><span>Catalyst SD-WAN Manager&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:774.391px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20133%2C%20https%3A//sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v%2C%20https%3A//www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems%2C%20https%3A//www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>https://nvd.nist.gov/vuln/detail/CVE-2026-20133, https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v, https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems, https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:164px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33825" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-33825</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.875px;"><div><div><p><span>Microsoft&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:264.609px;"><div><div><p><span>Defender&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:774.391px;"><div><div><p><span></span><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-33825" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825, https://nvd.nist.gov/vuln/detail/CVE-2026-33825</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:164px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-39987" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-39987</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.875px;"><div><div><p><span>Marimo&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:264.609px;"><div><div><p><span>Marimo&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:774.391px;"><div><div><p><span></span><a href="https://github.com/marimo-team/marimo/security/advisories/GHSA-2679-6mx9-h9xc%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-39987" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>https://github.com/marimo-team/marimo/security/advisories/GHSA-2679-6mx9-h9xc, https://nvd.nist.gov/vuln/detail/CVE-2026-39987</span></span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p><span>&nbsp;</span></p></div><div><p><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div><div><p><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div><div><div><table border="1"><tbody><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Critical&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>High&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Medium&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Low&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Total&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Silex Technology&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>SD-330AC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>9&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>13&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>SenseLive&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>X3050&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>11&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Milesight&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>MS-Cxx63-PD&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>5&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>SpiceJet&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Online Booking System&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>2&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Hardy Barth&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Salia Board Firmware&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>2&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Zero Motorcycles&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Zero Motorcycles firmware&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Hangzhou&nbsp;Xiongmai&nbsp;Technology Co., Ltd&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>IP Camera XM530V200_X6-WEQ_8M firmware&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Intrado&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Emergency Gateway&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Yadea&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>T5 Electric Bicycle&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Carlson Software&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>VASCO-B GNSS Receiver&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p><span>&nbsp;</span></p></div><div><p><span>&nbsp;</span></p></div><div><p><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p></div><div><div><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Score&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Severity&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EPSS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Percentile&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CWE&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Hangzhou&nbsp;Xiongmai&nbsp;Technology Co., Ltd&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>IP Camera XM530V200_X6-WEQ_8M firmware&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-65856" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2025-65856</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.633%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>70.441%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-306</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Intrado&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Emergency Gateway&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-6074" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-6074</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/35.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-35</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Milesight&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MS-Cxx63-PD&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32644" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-32644</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/321.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-321</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SenseLive&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>X3050&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25775" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-25775</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-306</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SenseLive&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>X3050&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-35503" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-35503</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/798.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-798</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SenseLive&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>X3050&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-40620" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-40620</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-306</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SenseLive&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>X3050&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-40630" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-40630</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/288.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-288</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Silex Technology&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SD-330AC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32956" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-32956</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.043%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>13.338%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/122.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-122</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Carlson Software&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>VASCO-B GNSS Receiver&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3893" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-3893</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-306</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SenseLive&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>X3050&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27843" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-27843</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-306</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Milesight&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MS-Cxx63-PD&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20766" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-20766</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/122.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-122</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Milesight&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MS-Cxx63-PD&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27785" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-27785</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/798.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-798</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Silex Technology&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SD-330AC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32955" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-32955</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.043%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>13.229%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/121.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-121</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SenseLive&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>X3050&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27841" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-27841</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/352.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-352</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SenseLive&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>X3050&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-39462" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-39462</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-522</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SenseLive&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>X3050&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-40623" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-40623</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-862</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SenseLive&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>X3050&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-35064" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-35064</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-306</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Silex Technology&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SD-330AC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2015-5621" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2015-5621</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>13.928%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>94.350%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/1395.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-1395</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Silex Technology&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SD-330AC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32965" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-32965</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.029%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.283%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/1188.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-1188</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SpiceJet&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Online Booking System&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-6375" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-6375</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/639.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-639</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SpiceJet&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Online Booking System&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-6376" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-6376</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-306</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Hardy Barth&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Salia Board Firmware&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-10371" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2025-10371</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.061%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>19.190%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/434.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-434</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yadea&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>T5 Electric Bicycle&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-70994" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2025-70994</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/1390.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-1390</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Milesight&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MS-Cxx63-PD&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28747" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-28747</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/639.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-639</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Milesight&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MS-Cxx63-PD&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32649" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-32649</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-78</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Silex Technology&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SD-330AC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24487" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2024-24487</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.635%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>70.483%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/266.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-266</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Silex Technology&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SD-330AC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32958" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-32958</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.028%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.015%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/321.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-321</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Silex Technology&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SD-330AC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32960" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-32960</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.016%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.700%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/226.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-226</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Silex Technology&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SD-330AC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32964" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-32964</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.043%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>13.021%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/93.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-93</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Zero Motorcycles&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Zero Motorcycles firmware&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1354" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-1354</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.020%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.648%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/322.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-322</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Hardy Barth&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Salia Board Firmware&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-5873" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2025-5873</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.173%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>38.728%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/434.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-434</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Silex Technology&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SD-330AC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32963" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-32963</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.030%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.540%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-79</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Silex Technology&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SD-330AC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32959" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-32959</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.9&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.018%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.584%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/327.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-327</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SenseLive&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>X3050&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25720" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-25720</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/613.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-613</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SenseLive&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>X3050&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-40431" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-40431</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/319.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-319</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Silex Technology&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SD-330AC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32957" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-32957</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.052%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>16.419%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-306</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Silex Technology&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SD-330AC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32961" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-32961</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.021%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.688%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/122.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-122</span></span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Silex Technology&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SD-330AC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32962" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CVE-2026-32962</span></span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.052%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;" class="zp-selected-cell"><div><div><p><span>16.419%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span style="text-decoration:underline;"><span>CWE-306</span></span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p><span>&nbsp;</span></p></div><div><p><span>-----&nbsp;<br/></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br/></span></p></div><div><p><span><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-mars-2027" target="_blank" rel="">- Bilan des Known Exploited Vulnerabilities du mois de mars 202</a><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-mars-2027" target="_blank" rel="">6</a>&nbsp;</span><br/></p></div><div><p><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div><div><p><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div></div><br/><p></p></div><p></p><div><div></div><br/></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 26 Apr 2026 19:42:17 +0200</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S16]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s16</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Panorama des menaces sur l'industrie manufacturière en 2026 : En 2025, le secteur manufacturier a été confronté à une forte augmentation des cybermenac ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><b></b></div></div></div><span><span><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><b></b></div></div></div><p><strong>Panorama des menaces sur l'industrie manufacturière en 2026 :</strong></p><p>En 2025, le secteur manufacturier a été confronté à une forte augmentation des cybermenaces, les incidents liés aux ransomwares visant ce secteur ont augmentés de 56 % par rapport à l'année précédente. Au troisième trimestre, l'Europe a enregistré 162 incidents, se positionnant derrière les Etats Unis en nombre d'attaques subies par ransomware. En revanche, d’autres régions comme le Brésil, l’Inde et la Chine sont moins touchées par ce type d’attaque (25 cas), mais davantage par des actions de défacement de sites publics, qui ont atteint environ 190 incidents. Ces tendances montrent que la menace cyber évolue différemment selon les régions</p><p><a href="https://checkpoint.cyberint.com/manufacturing-threat-landscape" title="https://checkpoint.cyberint.com/manufacturing-threat-landscape" rel="">https://checkpoint.cyberint.com/manufacturing-threat-landscape</a><br/></p><p><br/></p><p><strong>L'enjeu de la centralisation des achats pour la cybersécurité :</strong><br/></p><p></p><p>Dans cet article, l'éditeur Meritalk explique la difficulté de protéger à la fois les réseaux informatiques et les systèmes opérationnels. Ce problème vient de l'organisation des budgets, et non d'un manque de solution technologique. Aujourd'hui, les budgets sont répartis entre différents départements qui achètent leurs outils de sécurité de leur côté. Le regroupement des financements via des contrats globaux est la condition nécessaire pour standardiser efficacement la sécurité de tous les équipements.</p><p>&nbsp;<a href="https://www.meritalk.com/eliminating-silos-in-it-ot-cybersecurity-is-a-funding-challenge-not-a-technical-one/" title="https://www.meritalk.com/eliminating-silos-in-it-ot-cybersecurity-is-a-funding-challenge-not-a-technical-one/" rel="">https://www.meritalk.com/eliminating-silos-in-it-ot-cybersecurity-is-a-funding-challenge-not-a-technical-one/</a><br/></p><p><br/></p><p></p><p></p><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnerability&nbsp;Corner :</span>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</p></div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:176px;" class="zp-selected-cell"><div><p>CVE&nbsp;</p></div></td><td style="vertical-align:top;width:143.891px;"><div><p>Vendor&nbsp;</p></div></td><td style="vertical-align:top;width:294.281px;"><div><p>Product&nbsp;</p></div></td><td style="vertical-align:top;width:674.719px;"><div><p>Liens&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:176px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2009-0238" target="_blank" rel="noreferrer noopener">CVE-2009-0238</a>&nbsp;</p></div></td><td style="vertical-align:top;width:143.891px;"><div><p>Microsoft&nbsp;</p></div></td><td style="vertical-align:top;width:294.281px;"><div><p>Office&nbsp;</p></div></td><td style="vertical-align:top;width:674.719px;"><div><p><a href="https://learn.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-009%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2009-0238" target="_blank" rel="noreferrer noopener">https://learn.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-009, https://nvd.nist.gov/vuln/detail/CVE-2009-0238</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:176px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2012-1854" target="_blank" rel="noreferrer noopener">CVE-2012-1854</a>&nbsp;</p></div></td><td style="vertical-align:top;width:143.891px;"><div><p>Microsoft&nbsp;</p></div></td><td style="vertical-align:top;width:294.281px;"><div><p>Visual Basic for Applications (VBA)&nbsp;</p></div></td><td style="vertical-align:top;width:674.719px;"><div><p><a href="https://learn.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-046%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2012-1854" target="_blank" rel="noreferrer noopener">https://learn.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-046, https://nvd.nist.gov/vuln/detail/CVE-2012-1854</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:176px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-9715" target="_blank" rel="noreferrer noopener">CVE-2020-9715</a>&nbsp;</p></div></td><td style="vertical-align:top;width:143.891px;"><div><p>Adobe&nbsp;</p></div></td><td style="vertical-align:top;width:294.281px;"><div><p>Acrobat&nbsp;</p></div></td><td style="vertical-align:top;width:674.719px;"><div><p><a href="https://helpx.adobe.com/security/products/acrobat/apsb20-48.html%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2020-9715" target="_blank" rel="noreferrer noopener">https://helpx.adobe.com/security/products/acrobat/apsb20-48.html, https://nvd.nist.gov/vuln/detail/CVE-2020-9715</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:176px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-21529" target="_blank" rel="noreferrer noopener">CVE-2023-21529</a>&nbsp;</p></div></td><td style="vertical-align:top;width:143.891px;"><div><p>Microsoft&nbsp;</p></div></td><td style="vertical-align:top;width:294.281px;"><div><p>Exchange Server&nbsp;</p></div></td><td style="vertical-align:top;width:674.719px;"><div><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21529%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2023-21529" target="_blank" rel="noreferrer noopener">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21529, https://nvd.nist.gov/vuln/detail/CVE-2023-21529</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:176px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-36424" target="_blank" rel="noreferrer noopener">CVE-2023-36424</a>&nbsp;</p></div></td><td style="vertical-align:top;width:143.891px;"><div><p>Microsoft&nbsp;</p></div></td><td style="vertical-align:top;width:294.281px;"><div><p>Windows&nbsp;</p></div></td><td style="vertical-align:top;width:674.719px;"><div><p><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2023-36424%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2023-36424" target="_blank" rel="noreferrer noopener">https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2023-36424, https://nvd.nist.gov/vuln/detail/CVE-2023-36424</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:176px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-60710" target="_blank" rel="noreferrer noopener">CVE-2025-60710</a>&nbsp;</p></div></td><td style="vertical-align:top;width:143.891px;"><div><p>Microsoft&nbsp;</p></div></td><td style="vertical-align:top;width:294.281px;"><div><p>Windows&nbsp;</p></div></td><td style="vertical-align:top;width:674.719px;"><div><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60710%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-60710" target="_blank" rel="noreferrer noopener">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60710, https://nvd.nist.gov/vuln/detail/CVE-2025-60710</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:176px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21643" target="_blank" rel="noreferrer noopener">CVE-2026-21643</a>&nbsp;</p></div></td><td style="vertical-align:top;width:143.891px;"><div><p>Fortinet&nbsp;</p></div></td><td style="vertical-align:top;width:294.281px;"><div><p>FortiClient EMS&nbsp;</p></div></td><td style="vertical-align:top;width:674.719px;"><div><p><a href="https://fortiguard.fortinet.com/psirt/FG-IR-25-1142%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-21643" target="_blank" rel="noreferrer noopener">https://fortiguard.fortinet.com/psirt/FG-IR-25-1142, https://nvd.nist.gov/vuln/detail/CVE-2026-21643</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:176px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32201" target="_blank" rel="noreferrer noopener">CVE-2026-32201</a>&nbsp;</p></div></td><td style="vertical-align:top;width:143.891px;"><div><p>Microsoft&nbsp;</p></div></td><td style="vertical-align:top;width:294.281px;"><div><p>SharePoint Server&nbsp;</p></div></td><td style="vertical-align:top;width:674.719px;"><div><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-32201%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-32201" target="_blank" rel="noreferrer noopener">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-32201, https://nvd.nist.gov/vuln/detail/CVE-2026-32201</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:176px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-34197" target="_blank" rel="noreferrer noopener">CVE-2026-34197</a>&nbsp;</p></div></td><td style="vertical-align:top;width:143.891px;"><div><p>Apache&nbsp;</p></div></td><td style="vertical-align:top;width:294.281px;"><div><p>ActiveMQ&nbsp;</p></div></td><td style="vertical-align:top;width:674.719px;"><div><p><a href="https://activemq.apache.org/security-advisories.data/CVE-2026-34197-announcement.txt%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-34197" target="_blank" rel="noreferrer noopener">https://activemq.apache.org/security-advisories.data/CVE-2026-34197-announcement.txt, https://nvd.nist.gov/vuln/detail/CVE-2026-34197</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:176px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-34621" target="_blank" rel="noreferrer noopener">CVE-2026-34621</a>&nbsp;</p></div></td><td style="vertical-align:top;width:143.891px;"><div><p>Adobe&nbsp;</p></div></td><td style="vertical-align:top;width:294.281px;"><div><p>Acrobat and Reader&nbsp;</p></div></td><td style="vertical-align:top;width:674.719px;"><div><p><a href="https://helpx.adobe.com/security/products/acrobat/apsb26-43.html%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-34621" target="_blank" rel="noreferrer noopener">https://helpx.adobe.com/security/products/acrobat/apsb26-43.html, https://nvd.nist.gov/vuln/detail/CVE-2026-34621</a>&nbsp;</p></div></td></tr></tbody></table></div><div><p style="margin-bottom:13.3333px;">&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</p></div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:82px;"><div><p>Vendor&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Product&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Critical&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>High&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Medium&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Low&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Total&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Anviz&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>CX2 Lite Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>6&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>5&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>12&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>AVEVA&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Pipeline Simulation&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Delta Electronics&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>ASDA-Soft&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Horner Automation&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Cscape&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr></tbody></table></div><div><p style="margin-bottom:13.3333px;">&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</p></div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><p>Vendor&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Product&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CVE&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CVSSv3 Score&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CVSSv3 Severity&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>EPSS&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Percentile&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CWE&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Anviz&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CX2 Lite Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-35546" target="_blank" rel="noreferrer noopener">CVE-2026-35546</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener">CWE-306</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>AVEVA&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Pipeline Simulation&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-5387" target="_blank" rel="noreferrer noopener">CVE-2026-5387</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.1&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.041%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>12.369%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer noopener">CWE-862</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Horner Automation&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Cscape&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-6284" target="_blank" rel="noreferrer noopener">CVE-2026-6284</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.1&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/521.html" target="_blank" rel="noreferrer noopener">CWE-521</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Anviz&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CX2 Lite Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-35682" target="_blank" rel="noreferrer noopener">CVE-2026-35682</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/77.html" target="_blank" rel="noreferrer noopener">CWE-77</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Anviz&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CX2 Lite Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-40066" target="_blank" rel="noreferrer noopener">CVE-2026-40066</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/494.html" target="_blank" rel="noreferrer noopener">CWE-494</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Anviz&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CX2 Lite Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-40434" target="_blank" rel="noreferrer noopener">CVE-2026-40434</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.1&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/940.html" target="_blank" rel="noreferrer noopener">CWE-940</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Delta Electronics&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>ASDA-Soft&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-5726" target="_blank" rel="noreferrer noopener">CVE-2026-5726</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.005%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.255%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/121.html" target="_blank" rel="noreferrer noopener">CWE-121</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Anviz&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CX2 Lite Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32324" target="_blank" rel="noreferrer noopener">CVE-2026-32324</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.7&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/321.html" target="_blank" rel="noreferrer noopener">CWE-321</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Anviz&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CX2 Lite Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32650" target="_blank" rel="noreferrer noopener">CVE-2026-32650</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/757.html" target="_blank" rel="noreferrer noopener">CWE-757</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Anviz&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CX2 Lite Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-40461" target="_blank" rel="noreferrer noopener">CVE-2026-40461</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener">CWE-306</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Anviz&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CX2 Lite Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33569" target="_blank" rel="noreferrer noopener">CVE-2026-33569</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/319.html" target="_blank" rel="noreferrer noopener">CWE-319</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Anviz&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CX2 Lite Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32648" target="_blank" rel="noreferrer noopener">CVE-2026-32648</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>5.3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer noopener">CWE-862</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Anviz&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CX2 Lite Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33093" target="_blank" rel="noreferrer noopener">CVE-2026-33093</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>5.3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer noopener">CWE-862</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Anviz&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CX2 Lite Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-35061" target="_blank" rel="noreferrer noopener">CVE-2026-35061</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>5.3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer noopener">CWE-862</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Anviz&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CX2 Lite Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-31927" target="_blank" rel="noreferrer noopener">CVE-2026-31927</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>4.9&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/23.html" target="_blank" rel="noreferrer noopener">CWE-23</a>&nbsp;</p></div></td></tr></tbody></table></div><div><p style="margin-bottom:13.3333px;">&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">-----&nbsp;<br/><span style="font-weight:bold;">Actualité Fortress Cybersecurity</span>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-mars-2027" target="_blank" rel="">- Bilan des Known Exploited Vulnerabilities du mois de mars 202</a><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-mars-2027" target="_blank" rel="">6</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener">- Nouveau guide de classification des actifs industriels publié par l'ANSSI</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener">Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div></div><p><br/></p><p></p><p><br/></p><p></p><div><div></div><br/></div></span></span></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 19 Apr 2026 22:18:59 +0200</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S15]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s15</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Alerte CISA : Cyberattaques iraniennes contre les automates industriels Dans cet article, la CISA (Cybersecurity and Infrastructure Security Agency) al ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div><div><div><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><span style="font-weight:bold;">Alerte CISA : Cyberattaques iraniennes contre les automates industriels</span><p>Dans cet article, la CISA (Cybersecurity and Infrastructure Security Agency) alerte sur une campagne de cyberattaques menée par des pirates affiliés à l'Iran. Ces acteurs ciblent spécifiquement les automates industriels connectés à Internet afin de manipuler les systèmes de contrôle opérationnel. Ces intrusions ont déjà causé de sérieuses perturbations et d'importantes pertes financières dans plusieurs secteurs vitaux. L'objectif est de fournir des indicateurs techniques précis pour aider les entreprises à détecter d'éventuelles failles sur leurs réseaux.</p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-097a" title="https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-097a" rel="">https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-097a</a></div></div></div></div><div><p style="margin-bottom:13.3333px;"></p><div><p style="margin-bottom:13.3333px;"><br/></p></div></div></div><div><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"></div>
</div></div></div></div></div></div></div></div></div><div><div><div></div></div>
</div></div><div><div><div></div></div></div><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnerability&nbsp;Corner :</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:140.2px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:79.7375px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:267.65px;" class="zp-selected-cell"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:816.35px;"><div><div><p><span>Liens&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:140.2px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1340" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1340</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:79.7375px;"><div><div><p><span>Ivanti&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:267.65px;"><div><div><p><span>Endpoint Manager Mobile (EPMM)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:816.35px;"><div><div><p><span></span><a href="https://hub.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US%2C%20https%3A%2F%2Fnvd.nist.gov%2Fvuln%2Fdetail%2FCVE-2026-1340%2C%20https%3A%2F%2Fsupport.mobileiron.com%2Fmi%2Fvsp%2FAB1786671%2Fivanti-security-update-1761642-1.1.0L-5.noarch.rpm%2C%20https%3A%2F%2Fsupport.mobileiron.com%2Fmi%2Fvsp%2FAB1786671%2Fivanti-security-update-1761642-1.1.0S-5.noarch.rpm" target="_blank" rel="noreferrer noopener"><span>https://hub.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US, https://nvd.nist.gov/vuln/detail/CVE-2026-1340, https://support.mobileiron.com/mi/vsp/AB1786671/ivanti-security-update-1761642-1.1.0L-5.noarch.rpm, https://support.mobileiron.com/mi/vsp/AB1786671/ivanti-security-update-1761642-1.1.0S-5.noarch.rpm</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:140.2px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-35616" target="_blank" rel="noreferrer noopener"><span>CVE-2026-35616</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:79.7375px;"><div><div><p><span>Fortinet&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:267.65px;"><div><div><p><span>FortiClient EMS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:816.35px;"><div><div><p><span></span><a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-099%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-35616" target="_blank" rel="noreferrer noopener"><span>https://fortiguard.fortinet.com/psirt/FG-IR-26-099, https://nvd.nist.gov/vuln/detail/CVE-2026-35616</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Critical&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>High&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Medium&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Low&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Total&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Mitsubishi Electric&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>GENESIS64&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>2&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Contemporary Controls Sedona Alliance&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>BASControl20&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>GPL&nbsp;Odorizers&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>GPL750 (XL4)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Score&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Severity&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EPSS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Percentile&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CWE&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Contemporary Controls Sedona Alliance&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>BASControl20&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13926" target="_blank" rel="noreferrer noopener"><span>CVE-2025-13926</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/807.html" target="_blank" rel="noreferrer noopener"><span>CWE-807</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Mitsubishi Electric&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>GENESIS64&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14815" target="_blank" rel="noreferrer noopener"><span>CVE-2025-14815</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.998%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/312.html" target="_blank" rel="noreferrer noopener"><span>CWE-312</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Mitsubishi Electric&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>GENESIS64&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14816" target="_blank" rel="noreferrer noopener"><span>CVE-2025-14816</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.998%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/317.html" target="_blank" rel="noreferrer noopener"><span>CWE-317</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>GPL&nbsp;Odorizers&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>GPL750 (XL4)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-4436" target="_blank" rel="noreferrer noopener"><span>CVE-2026-4436</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br/></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br/>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-mars-2027" title="- Bilan des Known Exploited Vulnerabilities du mois de mars 2026&nbsp;" target="_blank" rel="">- Bilan des Known Exploited Vulnerabilities du mois de mars 202</a><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-mars-2027" title="- Bilan des Known Exploited Vulnerabilities du mois de mars 2026&nbsp;" target="_blank" rel="">6</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;">- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 13 Apr 2026 07:57:27 +0200</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S14]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s14</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Le plan de sauvetage de Jaguar Land Rover dans le secteur de la cybersécurité crée un précédent inquiétant&nbsp; &nbsp;selon les assureurs britanniques ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div><div><div><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><div><p style="font-weight:bold;"></p><strong>Le plan de sauvetage de Jaguar Land Rover dans le secteur de la cybersécurité crée un précédent inquiétant&nbsp;<span><span><strong>&nbsp;selon les assureurs britanniques</strong></span></span></strong><p><span><span>Pour rappel, suite à la cyberattaque qu'a subi Jaguar Land Rover environ&nbsp;<span><span>5000 sous-traitants ont été indirectement impactées.</span></span>&nbsp;Le gouvernement britannique est intervenu en injectant environ 1,7 milliard d'euros sans critères clairs, cela pose une question sur l'engagement des entreprises pour améliorer leur niveau de protection contre la menace cyber. De plus, l'intervention de l'état montre aussi une limite claire des assurances. Ils peuvent assurer une entreprise mais pas les sous-traitants.</span></span></p><a href="https://www.theregister.com/2026/03/20/jlr_bailout_cmc/" title="https://www.theregister.com/2026/03/20/jlr_bailout_cmc/" rel="">https://www.theregister.com/2026/03/20/jlr_bailout_cmc/</a><br/><p><br/></p><p><span style="font-weight:700;"><strong>Guide ENISA de la sécurité dès la conception</strong></span></p><p></p>Ce guide ENISA détaille comment intégrer la sécurité dès la conception et la maintenir sur tout le cycle de vie d’un produit. Il transforme des principes comme le secure by design et by default en actions concrètes (checklists, tests, contrôles CI/CD). Surtout, il donne une méthode claire : identifier les risques critiques, appliquer des configurations sécurisées dès le déploiement, et intégrer des contrôles automatiques pour vérifier en continu que le produit reste sécurisé.<p></p><a href="https://ncca.nbu.gov.sk/data/files/240_enisa_secure_by_design_and_default_playbook_v04.pdf?csrt=9023025590583266772" rel="">https://ncca.nbu.gov.sk/data/files/240_enisa_secure_by_design_and_default_playbook_v04.pdf?csrt=9023025590583266772</a><br/></div></div></div>
<br/><div><p style="margin-bottom:13.3333px;"></p><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnerability&nbsp;Corner :</span></span><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:171px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:138.969px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:132.984px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:847.016px;"><div><div><p><span>Liens&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:171px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3055" target="_blank" rel="noreferrer noopener"><span>CVE-2026-3055</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:138.969px;"><div><div><p><span>Citrix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:132.984px;"><div><div><p><span>NetScaler&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:847.016px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3055%2C%20https%3A//support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300&amp;articleURL=NetScaler_ADC_and_NetScaler_Gateway_Security_Bulletin_for_CVE_2026_3055_and_CVE_2026_4368" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2026-3055, https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300&amp;articleURL=NetScaler_ADC_and_NetScaler_Gateway_Security_Bulletin_for_CVE_2026_3055_and_CVE_2026_4368</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:171px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3502" target="_blank" rel="noreferrer noopener"><span>CVE-2026-3502</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:138.969px;"><div><div><p><span>TrueConf&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:132.984px;"><div><div><p><span>Client&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:847.016px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3502%2C%20https%3A//trueconf.com/blog/update/trueconf-8-5%2C%20https%3A//trueconf.com/downloads/windows.html" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2026-3502, https://trueconf.com/blog/update/trueconf-8-5, https://trueconf.com/downloads/windows.html</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:171px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-5281" target="_blank" rel="noreferrer noopener"><span>CVE-2026-5281</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:138.969px;"><div><div><p><span>Google&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:132.984px;"><div><div><p><span>Dawn&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:847.016px;"><div><div><p><span></span><a href="https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-5281" target="_blank" rel="noreferrer noopener"><span>https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html, https://nvd.nist.gov/vuln/detail/CVE-2026-5281</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:206px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:534px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:111.875px;"><div><p><strong>Critical&nbsp;</strong></p></div></td><td style="vertical-align:top;width:90.5625px;"><div><p><strong>High&nbsp;</strong></p></div></td><td style="vertical-align:top;width:123.031px;"><div><p><strong>Medium&nbsp;</strong></p></div></td><td style="vertical-align:top;width:115.125px;"><div><p><strong>Low&nbsp;</strong></p></div></td><td style="vertical-align:top;width:135.828px;" class="zp-selected-cell"><div><p><strong>Total&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:206px;"><div><p>Anritsu&nbsp;</p></div></td><td style="vertical-align:top;width:534px;"><div><p>Remote Spectrum Monitor MS27100A&nbsp;</p></div></td><td style="vertical-align:top;width:111.875px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:90.5625px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:123.031px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:115.125px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:135.828px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:206px;"><div><p>PX4&nbsp;</p></div></td><td style="vertical-align:top;width:534px;"><div><p>Autopilot&nbsp;</p></div></td><td style="vertical-align:top;width:111.875px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:90.5625px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:123.031px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:115.125px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:135.828px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:206px;"><div><p>Yokogawa&nbsp;</p></div></td><td style="vertical-align:top;width:534px;"><div><p>CENTUM VP&nbsp;</p></div></td><td style="vertical-align:top;width:111.875px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:90.5625px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:123.031px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:115.125px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:135.828px;"><div><p>1&nbsp;</p></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVSSv3 Score&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVSSv3 Severity&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>EPSS&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>Percentile&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CWE&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Anritsu&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Remote Spectrum Monitor MS27100A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3356" target="_blank" rel="noreferrer noopener">CVE-2026-3356</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.054%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>17.256%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener">CWE-306</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>PX4&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Autopilot&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1579" target="_blank" rel="noreferrer noopener">CVE-2026-1579</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;" class="zp-selected-cell"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.073%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>22.206%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener">CWE-306</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Yokogawa&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CENTUM VP&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-7741" target="_blank" rel="noreferrer noopener">CVE-2025-7741</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>4.0&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.018%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>4.385%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/259.html" target="_blank" rel="noreferrer noopener">CWE-259</a>&nbsp;</p></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br/></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br/>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de décembre 2025</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a></p></div><div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div></div><br/><p></p></div><div></div><p style="margin-bottom:13.3333px;"><br/></p></div></div><div><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"></div>
</div></div></div></div></div></div></div></div></div><div><div><div></div></div>
</div></div><div><div><div></div></div></div></div></div></div></div></div></div>
</div> ]]></content:encoded><pubDate>Tue, 07 Apr 2026 07:19:51 +0200</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S13]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s13</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Fuite de données chez AstraZeneca : Une fuite de données supposée chez AstraZeneca, revendiquée par un groupe de hackers appelé LAPSUS. Il est importan ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div><div><div><div><p style="font-weight:bold;">Fuite de données chez AstraZeneca :</p><p>Une fuite de données supposée chez AstraZeneca, revendiquée par un groupe de hackers appelé LAPSUS. Il est important de noter que ce n’est pas encore officiellement confirmé par AstraZeneca au moment de l’article. Les hackers affirment avoir volé des codes sources d'application, des fichiers d'infrastructure, des scripts SQL mais aucune données patients.</p><p><a href="https://socradar.io/blog/astrazeneca-data-breach-what-to-know/">https://socradar.io/blog/astrazeneca-data-breach-what-to-know/</a></p><p><br/></p><p><span><span style="font-weight:700;"><span>Guide sur la cybersécurité, la gestion des risques d'entreprise et la gestion des effectifs</span> :</span></span></p><p>Une publication récente du NIST, la SP 1308, détaille comment aligner les enjeux de cybersécurité, la gestion des risques d’entreprise et la gestion des compétences pour une approche cohérente.</p><p><span></span></p><p>Basé sur le Cybersecurity Framework 2.0 (CSF 2.0) et NICE Framework qui permet de gérer les compétences des équipes en charge de la cybersécurité, cette publication montre que les décisions de gestion des effectifs (recrutement, formation) doivent être directement pilotées par les risques cyber identifiés afin d’améliorer l’efficacité globale.</p><p><a href="https://csrc.nist.gov/pubs/sp/1308/final">https://csrc.nist.gov/pubs/sp/1308/final</a></p></div>
<br/><div><p style="margin-bottom:13.3333px;"></p><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnerability&nbsp;Corner :</span></span><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div>
<p></p><table border="1"><tbody><tr><td style="vertical-align:top;width:186px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:130.734px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:123.203px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:873.797px;"><div><p><strong>Liens&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:186px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33017" target="_blank" rel="noreferrer noopener">CVE-2026-33017</a>&nbsp;</p></div></td><td style="vertical-align:top;width:130.734px;"><div><p>Langflow&nbsp;</p></div></td><td style="vertical-align:top;width:123.203px;"><div><p>Langflow&nbsp;</p></div></td><td style="vertical-align:top;width:873.797px;" class="zp-selected-cell"><div><p><a href="https://github.com/langflow-ai/langflow/security/advisories/GHSA-vwmf-pq79-vjvx%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-33017" target="_blank" rel="noreferrer noopener">https://github.com/langflow-ai/langflow/security/advisories/GHSA-vwmf-pq79-vjvx, https://nvd.nist.gov/vuln/detail/CVE-2026-33017</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:186px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33634" target="_blank" rel="noreferrer noopener">CVE-2026-33634</a>&nbsp;</p></div></td><td style="vertical-align:top;width:130.734px;"><div><p>Aquasecurity&nbsp;</p></div></td><td style="vertical-align:top;width:123.203px;"><div><p>Trivy&nbsp;</p></div></td><td style="vertical-align:top;width:873.797px;"><div><p><a href="https://github.com/advisories/GHSA-69fq-xp46-6x23%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-33634" target="_blank" rel="noreferrer noopener">https://github.com/advisories/GHSA-69fq-xp46-6x23, https://nvd.nist.gov/vuln/detail/CVE-2026-33634</a>&nbsp;</p></div></td></tr></tbody></table><div><div style="margin-bottom:2px;"></div>
</div><p style="margin-bottom:13.3333px;"></p><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div>
<p></p><table border="1"><tbody><tr><td style="vertical-align:top;width:82px;" class="zp-selected-cell"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Critical&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>High&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Medium&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Low&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Total&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Schneider Electric&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>ProLeiT&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>2&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>4&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Grassroots&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Grassroots DICOM (GDCM)&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>OpenCode&nbsp;Systems&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>OC Messaging&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>Pharos Controls&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Mosaic Show Controller Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>PTC&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Windchill&nbsp;PDMLink&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><p>WAGO&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>Hardware&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr></tbody></table><div><div style="margin-bottom:2px;"></div>
</div><p style="margin-bottom:13.3333px;"></p><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p></div>
<p></p><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVSSv3 Score&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CVSSv3 Severity&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>EPSS&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>Percentile&nbsp;</strong></p></div></td><td style="vertical-align:top;width:72px;"><div><p><strong>CWE&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>PTC&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Windchill&nbsp;PDMLink&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-4681" target="_blank" rel="noreferrer noopener">CVE-2026-4681</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>10.0&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.378%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>59.201%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/94.html" target="_blank" rel="noreferrer noopener">CWE-94</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Schneider Electric&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>ProLeiT&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-49844" target="_blank" rel="noreferrer noopener">CVE-2025-49844</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>10&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>10.910%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>93.350%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/416.html" target="_blank" rel="noreferrer noopener">CWE-416</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>WAGO&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Hardware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3587" target="_blank" rel="noreferrer noopener">CVE-2026-3587</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>10&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.090%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;" class="zp-selected-cell"><div><p>25.634%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/912.html" target="_blank" rel="noreferrer noopener">CWE-912</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Pharos Controls&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Mosaic Show Controller Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-2417" target="_blank" rel="noreferrer noopener">CVE-2026-2417</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.101%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>27.930%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener">CWE-306</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>OpenCode&nbsp;Systems&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>OC Messaging&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-70614" target="_blank" rel="noreferrer noopener">CVE-2025-70614</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>8.1&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>0.032%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>9.101%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/284.html" target="_blank" rel="noreferrer noopener">CWE-284</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Grassroots&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>Grassroots DICOM (GDCM)&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3650" target="_blank" rel="noreferrer noopener">CVE-2026-3650</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/401.html" target="_blank" rel="noreferrer noopener">CWE-401</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Schneider Electric&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>ProLeiT&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-46817" target="_blank" rel="noreferrer noopener">CVE-2025-46817</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>7&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>13.200%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>94.079%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/190.html" target="_blank" rel="noreferrer noopener">CWE-190</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Schneider Electric&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>ProLeiT&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-46819" target="_blank" rel="noreferrer noopener">CVE-2025-46819</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6.3&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>5.046%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>89.713%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/190.html" target="_blank" rel="noreferrer noopener">CWE-190</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><p>Schneider Electric&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>ProLeiT&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-46818" target="_blank" rel="noreferrer noopener">CVE-2025-46818</a>&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>6&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>3.178%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p>86.887%&nbsp;</p></div></td><td style="vertical-align:top;width:72px;"><div><p><a href="https://cwe.mitre.org/data/definitions/94.html" target="_blank" rel="noreferrer noopener">CWE-94</a>&nbsp;</p></div></td></tr></tbody></table><div><div><div style="margin-bottom:2px;"></div>
</div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br/></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br/> &nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-janvier-2026" title="- Bilan des Known Exploited Vulnerabilities du mois de&nbsp;janvier 2025" target="_blank" rel="">- </a><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-janvier-2026" title="- Bilan des Known Exploited Vulnerabilities du mois de&nbsp;janvier 2025" target="_blank" rel="">Bilan des Known Exploited Vulnerabilities du mois de&nbsp;</a><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-janvier-2026" title="- Bilan des Known Exploited Vulnerabilities du mois de&nbsp;janvier 2025" target="_blank" rel="">janvier 2025</a></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
<div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div>
</div><p style="margin-bottom:13.3333px;"><br/></p></div></div><div><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"></div>
</div></div></div></div></div></div></div></div></div><div><div><div></div></div>
</div></div><div><div><div></div></div></div></div></div></div></div></div></div>
</div> ]]></content:encoded><pubDate>Mon, 30 Mar 2026 07:59:15 +0200</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S12]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s12</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Warlock une attaque ransomware sophistiquée : Cet article décrit une attaque du groupe Warlock où les attaquants exploitent une faille SharePoint pour ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div><div><div><p style="margin-bottom:13.3333px;"></p><p style="font-weight:bold;">Warlock une attaque ransomware sophistiquée :</p><p>Cet article décrit une attaque du groupe Warlock où les attaquants exploitent une faille SharePoint pour l'accès initial dans les systèmes de la victime. rester discrets pendant plusieurs jours, puis utiliser des outils légitimes notamment Visual Studio Code pour la prise en main à distance sans être détectés avant d’exfiltrer les données et déployer le ransomware à grande échelle. Il met en évidence des techniques avancées d’évasion et de persistance.</p><span><span><p><span><a href="https://www.trendmicro.com/fr_fr/research/26/c/dissecting-a-warlock-attack.html" target="_blank">https://www.trendmicro.com/fr_fr/research/26/c/dissecting-a-warlock-attack.html</a><span>&nbsp;</span></span><br/></p><p><span><span><br/></span></span></p><p><strong>KVM IP une faille critique sous-estimée :</strong></p><p>Un KVM IP (Keyboard, Video, Mouse) permet de contrôler un ordinateur à distance comme si on était physiquement devant, même au niveau BIOS. L’article montre que plusieurs KVM IP low-cost (<span><span>Sipeed,&nbsp;<span><span>JetKVM, etc.)</span></span></span></span> contiennent des vulnérabilités majeures (pas de vérification de firmware, absence de protection brute-force, accès non authentifié) permettant à un acteur de la menace cyber de prendre le contrôle total du KVM IP et potentiellement prendre le contrôle du PC si celui-ci n'est pas renforcé. Exemple avec les HMI, il n 'y a pas d'authentification au niveau de la session, l'acteur accède directement aux applications du HMI.</p></span></span><a href="https://eclypsium.com/blog/your-kvm-is-the-weak-link-how-30-dollar-devices-can-own-your-entire-network/">https://eclypsium.com/blog/your-kvm-is-the-weak-link-how-30-dollar-devices-can-own-your-entire-network/</a><br/><p></p><p style="margin-bottom:13.3333px;"><br/></p><p style="margin-bottom:13.3333px;"><strong>L'état de la cybersécurité dans le secteur industriel :</strong><br/></p><p style="margin-bottom:13.3333px;"><span><span>L'échantillon de l'étude comprend des petites (<span>moins de 1 000 employés)</span>, moyennes(entre 1000 et 10 000 employés) et grandes <span>entreprises&nbsp;</span>(plus de 10 000 employés) .&nbsp;</span>La majorité des cyberattaques sur les systèmes OT perturbent la production, avec environ 77 % des organisation ont expérimentés un incident cyber la dernière année. Le rapport montre également&nbsp; que malgré des budgets entre 6 millions et 25millions, 62 % des organisations ont moins de 10 employés dédiés à la cybersécurité industrielle. Dans ce contexte, l'étude confirme les tendances que les entreprises recherchent à externaliser et automatiser leur activités <span>cybersécurité&nbsp;</span>sur le périmètre industrielle.<br/></span><a href="https://assets.siemens-energy.com/dam/3307e8a8-e853-4c24-aa19-b2f900817951/State-of-OT-cybersecurity-for-energy-and-related-industries-pdf_Original%20file.pdf">https://assets.siemens-energy.com/dam/3307e8a8-e853-4c24-aa19-b2f900817951/State-of-OT-cybersecurity-for-energy-and-related-industries-pdf_Original%20file.pdf</a><br/></p><p style="margin-bottom:13.3333px;"></p><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnerability&nbsp;Corner :</span>&nbsp;</p><div><p style="margin-bottom:13.3333px;">Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;</p></div></div><p></p><table border="1" style="height:133.312px;"><tbody><tr><td style="vertical-align:top;width:144px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:177.25px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:376.312px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:495.688px;"><div><p><strong>Liens&nbsp;</strong></p></div></td></tr><tr style="height:59.0156px;"><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-47813" target="_blank" rel="noreferrer noopener">CVE-2025-47813</a>&nbsp;</p></div></td><td style="vertical-align:top;width:177.25px;"><div><p>Wing FTP Server&nbsp;</p></div></td><td style="vertical-align:top;width:376.312px;"><div><p>Wing FTP Server&nbsp;</p></div></td><td style="vertical-align:top;width:495.688px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-47813%2C%20https%3A//www.wftpserver.com/serverhistory.htm" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2025-47813, https://www.wftpserver.com/serverhistory.htm</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66376" target="_blank" rel="noreferrer noopener">CVE-2025-66376</a>&nbsp;</p></div></td><td style="vertical-align:top;width:177.25px;"><div><p>Synacor&nbsp;</p></div></td><td style="vertical-align:top;width:376.312px;"><div><p>Zimbra Collaboration Suite (ZCS)&nbsp;</p></div></td><td style="vertical-align:top;width:495.688px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66376%2C%20https%3A//wiki.zimbra.com/wiki/Zimbra_Security_Advisories" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2025-66376, https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20131" target="_blank" rel="noreferrer noopener">CVE-2026-20131</a>&nbsp;</p></div></td><td style="vertical-align:top;width:177.25px;"><div><p>Cisco&nbsp;</p></div></td><td style="vertical-align:top;width:376.312px;"><div><p>Secure Firewall Management Center (FMC)&nbsp;</p></div></td><td style="vertical-align:top;width:495.688px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20131%2C%20https%3A//sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2026-20131, https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20963" target="_blank" rel="noreferrer noopener">CVE-2026-20963</a>&nbsp;</p></div></td><td style="vertical-align:top;width:177.25px;"><div><p>Microsoft&nbsp;</p></div></td><td style="vertical-align:top;width:376.312px;"><div><p>SharePoint&nbsp;</p></div></td><td style="vertical-align:top;width:495.688px;"><div><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20963%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-20963" target="_blank" rel="noreferrer noopener">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20963, https://nvd.nist.gov/vuln/detail/CVE-2026-20963</a>&nbsp;</p></div></td></tr></tbody></table><p style="margin-bottom:13.3333px;"><span><span style="font-weight:bold;"><br/></span></span></p><p style="margin-bottom:13.3333px;"><span><span style="font-weight:bold;">Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span>&nbsp;</span></p><table border="1"><tbody><tr><td style="vertical-align:top;width:258px;"><div><p>V<strong>endor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:512px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:102.172px;"><div><p><strong>Critical&nbsp;</strong></p></div></td><td style="vertical-align:top;width:110.156px;"><div><p><strong>High&nbsp;</strong></p></div></td><td style="vertical-align:top;width:120.031px;"><div><p><strong>Medium&nbsp;</strong></p></div></td><td style="vertical-align:top;width:101.062px;"><div><p><strong>Low&nbsp;</strong></p></div></td><td style="vertical-align:top;width:110.406px;"><div><p><strong>Total&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:258px;"><div><p>CTEK&nbsp;</p></div></td><td style="vertical-align:top;width:512px;"><div><p>Chargeportal&nbsp;</p></div></td><td style="vertical-align:top;width:102.172px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:110.156px;"><div><p>2&nbsp;</p></div></td><td style="vertical-align:top;width:120.031px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:101.062px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:110.406px;"><div><p>4&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:258px;"><div><p>IGL-Technologies&nbsp;</p></div></td><td style="vertical-align:top;width:512px;"><div><p>eParking.fi&nbsp;</p></div></td><td style="vertical-align:top;width:102.172px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:110.156px;"><div><p>2&nbsp;</p></div></td><td style="vertical-align:top;width:120.031px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:101.062px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:110.406px;"><div><p>4&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:258px;"><div><p>Automated Logic&nbsp;</p></div></td><td style="vertical-align:top;width:512px;"><div><p>WebCTRL&nbsp;Premium Server&nbsp;</p></div></td><td style="vertical-align:top;width:102.172px;" class="zp-selected-cell"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:110.156px;"><div><p>2&nbsp;</p></div></td><td style="vertical-align:top;width:120.031px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:101.062px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:110.406px;"><div><p>3&nbsp;</p></div></td></tr></tbody></table><div></div><p style="margin-bottom:13.3333px;"><span><br/></span></p><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p><p style="margin-bottom:13.3333px;"></p><div><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Score&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Severity&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EPSS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Percentile&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CWE&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>CTEK&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Chargeportal&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25192" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25192</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>IGL-Technologies&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>eParking.fi&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-29796" target="_blank" rel="noreferrer noopener"><span>CVE-2026-29796</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;" class="zp-selected-cell"><div><div><p><span>9.4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Automated Logic&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>WebCTRL&nbsp;Premium Server&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24060" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24060</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/319.html" target="_blank" rel="noreferrer noopener"><span>CWE-319</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Automated Logic&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>WebCTRL&nbsp;Premium Server&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25086" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25086</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.7&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/605.html" target="_blank" rel="noreferrer noopener"><span>CWE-605</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Automated Logic&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>WebCTRL&nbsp;Premium Server&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32666" target="_blank" rel="noreferrer noopener"><span>CVE-2026-32666</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/290.html" target="_blank" rel="noreferrer noopener"><span>CWE-290</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>CTEK&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Chargeportal&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-31904" target="_blank" rel="noreferrer noopener"><span>CVE-2026-31904</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/307.html" target="_blank" rel="noreferrer noopener"><span>CWE-307</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>IGL-Technologies&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>eParking.fi&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-31903" target="_blank" rel="noreferrer noopener"><span>CVE-2026-31903</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/307.html" target="_blank" rel="noreferrer noopener"><span>CWE-307</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>CTEK&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Chargeportal&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27649" target="_blank" rel="noreferrer noopener"><span>CVE-2026-27649</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/613.html" target="_blank" rel="noreferrer noopener"><span>CWE-613</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>IGL-Technologies&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>eParking.fi&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32663" target="_blank" rel="noreferrer noopener"><span>CVE-2026-32663</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/613.html" target="_blank" rel="noreferrer noopener"><span>CWE-613</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>CTEK&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Chargeportal&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28204" target="_blank" rel="noreferrer noopener"><span>CVE-2026-28204</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>IGL-Technologies&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>eParking.fi&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-31926" target="_blank" rel="noreferrer noopener"><span>CVE-2026-31926</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><br/></span></p><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span>&nbsp;<br/></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" target="_blank" rel="noreferrer noopener">- Bilan des Known Exploited Vulnerabilities du mois de janvier 2025</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener">- Nouveau guide de classification des actifs industriels publié par l'ANSSI</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener">Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;">- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div></div><p></p></div><div><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div><p></p></div><div><p></p></div><p></p></div><div><p></p></div><p></p></div><p></p></div><p></p></div><p></p></div><p></p></div><p></p></div></div></div></div></div><div><div><div><div><p></p></div>
</div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 22 Mar 2026 17:16:05 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S11]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s11</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Cybermenaces dans l’industrie automobile L’article explique que la transformation numérique du secteur automobile (véhicules connectés, systèmes téléma ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div><div><div><div><div><div><div><p style="font-weight:bold;margin-bottom:13.3333px;"><strong><strong>Cybermenaces dans l’industrie automobile</strong></strong></p><div><p><span>L’article explique que la transformation numérique du secteur automobile (véhicules connectés, systèmes télématiques, réseaux de recharge pour véhicules électriques et chaînes d’approvisionnement digitalisées) crée de nouvelles surfaces d’attaque pour les acteurs de la menace. Il montre comment des malwares et ransomwares peuvent perturber non seulement les systèmes IT des constructeurs, mais aussi des éléments critiques comme les mises à jour logicielles des véhicules, les services connectés ou l’écosystème des véhicules électriques. Des risques concrets ont été illustrés : ralentissement des activités d’un concessionnaire à cause d’un malware, vulnérabilités liées aux mises à jour de véhicules connectés ou perturbations dans la chaîne logistique.</span></p></div><a href="https://www.bitsight.com/blog/automotive-cyber-threats-ransomware-malware-trends" title="https://www.bitsight.com/blog/automotive-cyber-threats-ransomware-malware-trends" rel="">https://www.bitsight.com/blog/automotive-cyber-threats-ransomware-malware-trends</a><br/></div></div></div></div><p></p><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span><span><span><span><span><span><span><span><span><span><strong>Rapport Cisco 2026 l'état de l'IA dans le monde industriel</strong></span></span></span><span></span></span></span></span></span></span></span></span></span></p></div>
<div><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><p style="margin-bottom:13.3333px;"><span><span>L’étude s’appuie sur des données recueillies auprès d’entreprises du monde entier, avec environ 1 000 professionnels de l’industrie interrogés. Elle montre que l’IA occupe désormais une place importante dans des processus critiques, notamment l’automatisation des processus et l’inspection automatisée de la qualité. Environ 70 % des professionnels déclarent avoir déployé de manière mature des solutions d’IA dans ces domaines. Cependant, cette adoption soulève aussi des questions d’exposition aux menaces. Le paradoxe est que, malgré ce niveau de maturité, 40 % des répondants estiment que le principal frein au déploiement reste la cybersécurité.</span></span></p><a href="https://www.cisco.com/c/dam/en/us/solutions/networking/industrial-iot/2026-state-of-industrial-ai-report.pdf" title="https://www.cisco.com/c/dam/en/us/solutions/networking/industrial-iot/2026-state-of-industrial-ai-report.pdf" rel="">https://www.cisco.com/c/dam/en/us/solutions/networking/industrial-iot/2026-state-of-industrial-ai-report.pdf</a><br/><p></p><strong><p style="margin-bottom:13.3333px;line-height:2;"></p></strong><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnerability&nbsp;Corner :</span>&nbsp;</p><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:144px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:141.25px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:202.266px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:720.734px;"><div><div><p><span>Liens&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22054" target="_blank" rel="noreferrer noopener"><span>CVE-2021-22054</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:141.25px;"><div><div><p><span>Omnissa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:202.266px;"><div><div><p><span>Workspace One UEM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:720.734px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22054%2C%20https%3A//web.archive.org/web/20211222154335/https%3A//www.vmware.com/security/advisories/VMSA-2021-0029.html" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2021-22054, https://web.archive.org/web/20211222154335/https://www.vmware.com/security/advisories/VMSA-2021-0029.html</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-26399" target="_blank" rel="noreferrer noopener"><span>CVE-2025-26399</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:141.25px;"><div><div><p><span>SolarWinds&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:202.266px;"><div><div><p><span>Web Help Desk&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:720.734px;"><div><div><p><span></span><a href="https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_12-8-7-hotfix-1_release_notes.htm%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-26399%2C%20https%3A//www.solarwinds.com/trust-center/security-advisories/cve-2025-26399" target="_blank" rel="noreferrer noopener"><span>https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_12-8-7-hotfix-1_release_notes.htm, https://nvd.nist.gov/vuln/detail/CVE-2025-26399, https://www.solarwinds.com/trust-center/security-advisories/cve-2025-26399</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68613" target="_blank" rel="noreferrer noopener"><span>CVE-2025-68613</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:141.25px;"><div><div><p><span>n8n&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:202.266px;"><div><div><p><span>n8n&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:720.734px;"><div><div><p><span></span><a href="https://github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-68613" target="_blank" rel="noreferrer noopener"><span>https://github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp, https://nvd.nist.gov/vuln/detail/CVE-2025-68613</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1603" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1603</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:141.25px;"><div><div><p><span>Ivanti&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:202.266px;"><div><div><p><span>&nbsp;Endpoint Manager (EPM)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:720.734px;"><div><div><p><span></span><a href="https://hub.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024?language=en_US%2C%20https%3A%2F%2Fnvd.nist.gov%2Fvuln%2Fdetail%2FCVE-2026-1603" target="_blank" rel="noreferrer noopener"><span>https://hub.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024?language=en_US, https://nvd.nist.gov/vuln/detail/CVE-2026-1603</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>Critical&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>High&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>Medium&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>Low&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>Total&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>Heliox Flex 180 kW EV Charging&nbsp;Station,RUGGEDCOM&nbsp;APE1808,SIDIS&nbsp;Prime,SIMATIC&nbsp;Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>13&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>13&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>29&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Lantronix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>8&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Trane&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>Tracer SC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>5&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Apeman&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>ID71&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>3&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Inductive Automation&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>Ignition Software&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Ceragon&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>MultiHaul&nbsp;MH-B100-CCS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Honeywell&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>IQ4E&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Score&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Severity&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EPSS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Percentile&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CWE&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Honeywell&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>IQ4E&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3611" target="_blank" rel="noreferrer noopener"><span>CVE-2026-3611</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>10.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Apeman&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ID71&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11126" target="_blank" rel="noreferrer noopener"><span>CVE-2025-11126</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.180%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>39.342%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67038" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67038</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.773%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67039" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67039</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.034%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.739%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/288.html" target="_blank" rel="noreferrer noopener"><span>CWE-288</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>RUGGEDCOM APE1808&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24858" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24858</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.776%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>85.865%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/288.html" target="_blank" rel="noreferrer noopener"><span>CWE-288</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIMATIC Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40943" target="_blank" rel="noreferrer noopener"><span>CVE-2025-40943</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.041%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>12.336%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer noopener"><span>CWE-79</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-7783" target="_blank" rel="noreferrer noopener"><span>CVE-2025-7783</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.7&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.177%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>38.929%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/330.html" target="_blank" rel="noreferrer noopener"><span>CWE-330</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-12816" target="_blank" rel="noreferrer noopener"><span>CVE-2025-12816</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.059%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>18.361%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/436.html" target="_blank" rel="noreferrer noopener"><span>CWE-436</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66035" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66035</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.075%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>22.465%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/201.html" target="_blank" rel="noreferrer noopener"><span>CWE-201</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Trane&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Tracer SC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28252" target="_blank" rel="noreferrer noopener"><span>CVE-2026-28252</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/327.html" target="_blank" rel="noreferrer noopener"><span>CWE-327</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66412" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66412</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.039%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>11.354%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer noopener"><span>CWE-79</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22610" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22610</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.014%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.383%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer noopener"><span>CWE-79</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-6965" target="_blank" rel="noreferrer noopener"><span>CVE-2025-6965</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.7&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.072%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>21.786%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/197.html" target="_blank" rel="noreferrer noopener"><span>CWE-197</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-29857" target="_blank" rel="noreferrer noopener"><span>CVE-2024-29857</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.337%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>56.144%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener"><span>CWE-125</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-30172" target="_blank" rel="noreferrer noopener"><span>CVE-2024-30172</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.136%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>33.229%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/20.html" target="_blank" rel="noreferrer noopener"><span>CWE-20</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41996" target="_blank" rel="noreferrer noopener"><span>CVE-2024-41996</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.430%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>62.198%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/295.html" target="_blank" rel="noreferrer noopener"><span>CWE-295</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-15284" target="_blank" rel="noreferrer noopener"><span>CVE-2025-15284</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.193%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>40.993%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/20.html" target="_blank" rel="noreferrer noopener"><span>CWE-20</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58754" target="_blank" rel="noreferrer noopener"><span>CVE-2025-58754</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.102%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>27.909%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/770.html" target="_blank" rel="noreferrer noopener"><span>CWE-770</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64756" target="_blank" rel="noreferrer noopener"><span>CVE-2025-64756</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.038%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>11.294%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66031" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66031</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.115%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>30.056%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/674.html" target="_blank" rel="noreferrer noopener"><span>CWE-674</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Trane&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Tracer SC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28253" target="_blank" rel="noreferrer noopener"><span>CVE-2026-28253</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/789.html" target="_blank" rel="noreferrer noopener"><span>CWE-789</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67034" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67034</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.773%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67035" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67035</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.773%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67036" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67036</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.773%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67037" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67037</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.773%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67041" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67041</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.044%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>13.196%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Trane&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Tracer SC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28255" target="_blank" rel="noreferrer noopener"><span>CVE-2026-28255</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/798.html" target="_blank" rel="noreferrer noopener"><span>CWE-798</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>RUGGEDCOM APE1808&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64157" target="_blank" rel="noreferrer noopener"><span>CVE-2025-64157</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.7&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.826%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/134.html" target="_blank" rel="noreferrer noopener"><span>CWE-134</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-62522" target="_blank" rel="noreferrer noopener"><span>CVE-2025-62522</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.016%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>83.540%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/22.html" target="_blank" rel="noreferrer noopener"><span>CWE-22</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Inductive Automation&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Ignition Software&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13913" target="_blank" rel="noreferrer noopener"><span>CVE-2025-13913</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/502.html" target="_blank" rel="noreferrer noopener"><span>CWE-502</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-30171" target="_blank" rel="noreferrer noopener"><span>CVE-2024-30171</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.9&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.100%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>27.724%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/203.html" target="_blank" rel="noreferrer noopener"><span>CWE-203</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9232" target="_blank" rel="noreferrer noopener"><span>CVE-2025-9232</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.9&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.033%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.182%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener"><span>CWE-125</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>RUGGEDCOM APE1808&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-55018" target="_blank" rel="noreferrer noopener"><span>CVE-2025-55018</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.053%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>16.404%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/444.html" target="_blank" rel="noreferrer noopener"><span>CWE-444</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Trane&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Tracer SC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28254" target="_blank" rel="noreferrer noopener"><span>CVE-2026-28254</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer noopener"><span>CWE-862</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Trane&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Tracer SC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28256" target="_blank" rel="noreferrer noopener"><span>CVE-2026-28256</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/547.html" target="_blank" rel="noreferrer noopener"><span>CWE-547</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9230" target="_blank" rel="noreferrer noopener"><span>CVE-2025-9230</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.031%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.655%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/787.html" target="_blank" rel="noreferrer noopener"><span>CWE-787</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Apeman&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ID71&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11852" target="_blank" rel="noreferrer noopener"><span>CVE-2025-11852</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.073%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>22.012%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Ceragon&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MultiHaul&nbsp;MH-B100-CCS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-57176" target="_blank" rel="noreferrer noopener"><span>CVE-2025-57176</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.663%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>70.878%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/434.html" target="_blank" rel="noreferrer noopener"><span>CWE-434</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64718" target="_blank" rel="noreferrer noopener"><span>CVE-2025-64718</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.020%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.992%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/1321.html" target="_blank" rel="noreferrer noopener"><span>CWE-1321</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66030" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66030</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.042%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>12.433%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/190.html" target="_blank" rel="noreferrer noopener"><span>CWE-190</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9670" target="_blank" rel="noreferrer noopener"><span>CVE-2025-9670</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.051%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>15.546%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/1333.html" target="_blank" rel="noreferrer noopener"><span>CWE-1333</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-69277" target="_blank" rel="noreferrer noopener"><span>CVE-2025-69277</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.007%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.597%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/184.html" target="_blank" rel="noreferrer noopener"><span>CWE-184</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58751" target="_blank" rel="noreferrer noopener"><span>CVE-2025-58751</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.421%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>80.382%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/22.html" target="_blank" rel="noreferrer noopener"><span>CWE-22</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58752" target="_blank" rel="noreferrer noopener"><span>CVE-2025-58752</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.016%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.513%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/23.html" target="_blank" rel="noreferrer noopener"><span>CWE-23</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>RUGGEDCOM APE1808&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-62439" target="_blank" rel="noreferrer noopener"><span>CVE-2025-62439</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.901%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/940.html" target="_blank" rel="noreferrer noopener"><span>CWE-940</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Apeman&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ID71&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11851" target="_blank" rel="noreferrer noopener"><span>CVE-2025-11851</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.052%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>16.124%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer noopener"><span>CWE-79</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-70082" target="_blank" rel="noreferrer noopener"><span>CVE-2025-70082</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.7&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.066%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>20.274%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/620.html" target="_blank" rel="noreferrer noopener"><span>CWE-620</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Heliox Flex 180 kW EV Charging Station&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-27769" target="_blank" rel="noreferrer noopener"><span>CVE-2025-27769</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.014%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.550%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/923.html" target="_blank" rel="noreferrer noopener"><span>CWE-923</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br/></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br/>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de janvier 2025</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div></div><br/><p></p></div><div><p></p></div><p></p></div><div><p></p></div><p></p></div><p></p></div><p></p></div><p></p></div><p></p></div><p></p></div></div></div></div></div><div><div><div><div><p></p></div>
</div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 13 Mar 2026 15:48:19 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S10]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s10</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>0.000 Les paiements liés aux ransomwares diminuent Les chercheurs en cybersécurité ont observés une augmentation de 50% du nombre de victimes de ransomw ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><span>0.000</span><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span></span></span></span></span><div><div><div><p style="margin-bottom:13.3333px;"></p><div><div><div><p style="font-weight:bold;margin-bottom:13.3333px;"><strong>Les paiements liés aux ransomwares diminuent</strong></p><div><p>Les chercheurs en cybersécurité ont observés une augmentation de 50% du nombre de victimes de ransomware. Pourtant les paiements liés aux ransomwares diminuent de 8%. L'article explique que les entreprises refusent de plus en plus de payer, grâce à de meilleures stratégies de réponse et de surveillance, une pression accrue des autorités contre les opérateurs de ransomware, les infrastructures et des faiblesses cryptographique qui permet au victime de décrypter les données comme avec le ransomware VolkLocker.</p></div><a href="https://www.infosecurity-magazine.com/news/ransomware-payments-decline-1/" title="https://www.infosecurity-magazine.com/news/ransomware-payments-decline-1/" rel="">https://www.infosecurity-magazine.com/news/ransomware-payments-decline-1/</a><br/></div></div></div><p></p><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span><span><span><span><span><span><span><span>Cybermenaces dans l’industrie pharmaceutique</span><span></span></span></span></span></span></span></span></span></span></p></div>
<div><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><p style="margin-bottom:13.3333px;">L’industrie pharmaceutique est une cible privilégiée des cyberattaques en raison de la valeur élevée de sa propriété intellectuelle et des données de santé sensibles qu’elle détient. Elle est exposée à plusieurs risques, comme le vol de données, les attaques de la chaîne d’approvisionnement, les erreurs humaines ou encore les vulnérabilités liées aux systèmes anciens et aux environnements cloud complexes.</p><a href="https://www.hornetsecurity.com/en/blog/cyber-threats-to-pharmaceutical-industry/" title="https://www.hornetsecurity.com/en/blog/cyber-threats-to-pharmaceutical-industry/" rel="">https://www.hornetsecurity.com/en/blog/cyber-threats-to-pharmaceutical-industry/</a><p></p><strong><p style="margin-bottom:13.3333px;line-height:2;"></p></strong><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnerability&nbsp;Corner :</span>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:152px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span>Liens&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:152px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-7921" target="_blank" rel="noreferrer noopener"><span>CVE-2017-7921</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Hikvision&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>Multiple Products&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-7921%2C%20https%3A//www.hikvision.com/us-en/support/document-center/special-notices/privilege-escalating-vulnerability-in-certain-hikvision-ip-cameras/" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2017-7921, https://www.hikvision.com/us-en/support/document-center/special-notices/privilege-escalating-vulnerability-in-certain-hikvision-ip-cameras/</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:152px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22681" target="_blank" rel="noreferrer noopener"><span>CVE-2021-22681</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Rockwell&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>Multiple Products&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22681%2C%20https%3A//support.rockwellautomation.com/app/answers/answer_view/a_id/1130301/%7E/cve-2021-22681%3A-authentication-bypass-vulnerability-found-in-logix-controllers-%2C%20https%3A//www.cisa.gov/news-events/ics-advisories/icsa-21-056-03" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2021-22681, https://support.rockwellautomation.com/app/answers/answer_view/a_id/1130301/~/cve-2021-22681%3A-authentication-bypass-vulnerability-found-in-logix-controllers-, https://www.cisa.gov/news-events/ics-advisories/icsa-21-056-03</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:152px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-30952" target="_blank" rel="noreferrer noopener"><span>CVE-2021-30952</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Apple&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>Multiple Products&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-30952%2C%20https%3A//support.apple.com/en-us/HT212975%2C%20https%3A//support.apple.com/en-us/HT212976%2C%20https%3A//support.apple.com/en-us/HT212978%2C%20https%3A//support.apple.com/en-us/HT212980%2C%20https%3A//support.apple.com/en-us/HT212982" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2021-30952, https://support.apple.com/en-us/HT212975, https://support.apple.com/en-us/HT212976, https://support.apple.com/en-us/HT212978, https://support.apple.com/en-us/HT212980, https://support.apple.com/en-us/HT212982</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:152px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-41974" target="_blank" rel="noreferrer noopener"><span>CVE-2023-41974</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Apple&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>iOS and iPadOS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-41974%2C%20https%3A//support.apple.com/en-us/HT213938%2C%20https%3A//support.apple.com/kb/HT213938" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2023-41974, https://support.apple.com/en-us/HT213938, https://support.apple.com/kb/HT213938</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:152px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-43000" target="_blank" rel="noreferrer noopener"><span>CVE-2023-43000</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Apple&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>Multiple Products&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-43000%2C%20https%3A//support.apple.com/en-us/120324%2C%20https%3A//support.apple.com/en-us/120331%2C%20https%3A//support.apple.com/en-us/120338" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2023-43000, https://support.apple.com/en-us/120324, https://support.apple.com/en-us/120331, https://support.apple.com/en-us/120338</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:152px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21385" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21385</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Qualcomm&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>Multiple Chipsets&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21385%2C%20https%3A//source.android.com/docs/security/bulletin/2026/2026-03-01" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2026-21385, https://source.android.com/docs/security/bulletin/2026/2026-03-01</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:152px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22719" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22719</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Broadcom&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>VMware Aria Operations&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span></span><a href="https://knowledge.broadcom.com/external/article/430349%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-22719%2C%20https%3A//support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947" target="_blank" rel="noreferrer noopener"><span>https://knowledge.broadcom.com/external/article/430349, https://nvd.nist.gov/vuln/detail/CVE-2026-22719, https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"></p><table border="1"><tbody><tr><td style="vertical-align:top;width:216px;"><p><strong>Vendor&nbsp;</strong></p></td><td style="vertical-align:top;width:522px;"><p><strong>Product&nbsp;</strong></p></td><td style="vertical-align:top;width:125.547px;"><p><strong>Critical&nbsp;</strong></p></td><td style="vertical-align:top;width:110.422px;"><p><strong>High&nbsp;</strong></p></td><td style="vertical-align:top;width:120.938px;"><p><strong>Medium&nbsp;</strong></p></td><td style="vertical-align:top;width:131px;"><p><strong>Low&nbsp;</strong></p></td><td style="vertical-align:top;width:91px;"><p><strong>Total&nbsp;</strong></p></td></tr><tr><td style="width:216px;"> <span>Mobiliti</span></td><td style="width:522px;"> <span>Mobiliti e-mobi.hu</span></td><td style="width:125.547px;"> 1</td><td style="width:110.422px;">2</td><td style="width:120.938px;">1</td><td style="width:131px;">0</td><td style="width:91px;">4</td></tr><tr><td style="width:216px;"> <span> Everon</span></td><td style="width:522px;"> <span><span> Everon OCPP Backends</span></span></td><td style="width:125.547px;"> 1</td><td style="width:110.422px;">2</td><td style="width:120.938px;">1</td><td style="width:131px;">0</td><td style="width:91px;">4</td></tr><tr><td style="width:216px;"><span><span>ePower</span></span></td><td style="width:522px;"><span>ePower epower.ie</span></td><td style="width:125.547px;">1</td><td style="width:110.422px;">2</td><td style="width:120.938px;">1</td><td style="width:131px;">0</td><td style="width:91px;">4</td></tr><tr><td style="width:216px;"> <span><span>Labkotec</span></span></td><td style="width:522px;"> <span>Labkotec LID-3300IP</span></td><td style="width:125.547px;"> 1</td><td style="width:110.422px;">0</td><td style="width:120.938px;">0</td><td style="width:131px;">0</td><td style="width:91px;">1</td></tr><tr><td style="width:216px;"> <span>Hitachi Energy</span></td><td style="width:522px;"> <span> RTU500 series CMU Firmware version 12.7.1 through 12.7.7, RTU500 series CMU Firmware version 13.5.1 through 13.5.4, RTU500 series CMU Firmware version 13.6.1 through 13.6.2, RTU500 series CMU Firmware version 13.7.1 through 13.7.7, RTU500 series CMU Firmware version 13.8.1</span></td><td style="width:125.547px;">0</td><td style="width:110.422px;">3</td><td style="width:120.938px;">1</td><td style="width:131px;"> 0</td><td style="width:91px;"> 4</td></tr><tr><td style="width:216px;"> <span><span>Mitsubishi Electric</span></span></td><td style="width:522px;"><span><span>Mitsubishi Electric MELSEC iQ-F Series EtherNet/IP module and Ethernet module</span></span> </td><td style="width:125.547px;"> 0</td><td style="width:110.422px;">3</td><td style="width:120.938px;">0</td><td style="width:131px;">0</td><td style="width:91px;">1</td></tr><tr><td style="width:216px;"> <span>Portwell</span></td><td style="width:522px;"> <span><span> Portwell Engineering Toolkits</span></span></td><td style="width:125.547px;"> 0</td><td style="width:110.422px;">1</td><td style="width:120.938px;">0</td><td style="width:131px;">0</td><td style="width:91px;">1</td></tr><tr><td style="width:216px;"><span>Delta Electronics</span></td><td style="width:522px;"> <span>Delta Electronics CNCSoft-G2</span></td><td style="width:125.547px;"> 0</td><td style="width:110.422px;">1</td><td style="width:120.938px;">0</td><td style="width:131px;">0</td><td style="width:91px;">1</td></tr><tr><td style="vertical-align:top;width:216px;"><p>Delta Electronics&nbsp;</p></td><td style="vertical-align:top;width:522px;"><p>EVMAPA&nbsp;</p></td><td style="vertical-align:top;width:125.547px;"><p>0</p></td><td style="vertical-align:top;width:110.422px;"><p>1</p></td><td style="vertical-align:top;width:120.938px;"><p>0&nbsp;</p></td><td style="vertical-align:top;width:131px;"><p>0&nbsp;</p></td><td style="vertical-align:top;width:91px;"><p>1</p></td></tr><tr><td style="vertical-align:top;width:216px;"><p><span><span> Hitachi Energy</span></span><br/></p></td><td style="vertical-align:top;width:522px;"><span><span>CVE-2026-2460</span></span><br/></td><td style="vertical-align:top;width:125.547px;">0</td><td style="vertical-align:top;width:110.422px;">0</td><td style="vertical-align:top;width:120.938px;">2</td><td style="vertical-align:top;width:131px;">0</td><td style="vertical-align:top;width:91px;">2</td></tr></tbody></table><p></p></div><div><p style="margin-bottom:13.3333px;"><br/></p><p style="margin-bottom:13.3333px;">Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"><span></span></p><div><table border="1"><tbody><tr><td style="vertical-align:top;width:174px;"><p><strong>Vendor&nbsp;</strong></p></td><td style="vertical-align:top;width:476px;"><p><strong>Product&nbsp;</strong></p></td><td style="vertical-align:top;width:159.094px;"><p><strong>CVE&nbsp;</strong></p></td><td style="vertical-align:top;width:98.3594px;"><p><strong>CVSSv3 Score&nbsp;</strong></p></td><td style="vertical-align:top;width:99.9375px;"><p><strong>CVSSv3 Severity&nbsp;</strong></p></td><td style="vertical-align:top;width:99.8125px;"><p><strong>EPSS&nbsp;</strong></p></td><td style="vertical-align:top;width:105.297px;"><p><strong>Percentile&nbsp;</strong></p></td><td style="vertical-align:top;width:100.328px;"><p><strong>CWE&nbsp;</strong></p></td></tr><tr><td style="vertical-align:top;width:174px;"><p>Delta Electronics&nbsp;</p></td><td style="vertical-align:top;width:476px;"><p>EVMAPA&nbsp;</p></td><td style="vertical-align:top;width:159.094px;"><p>CVE-2026-3094<br/></p></td><td style="vertical-align:top;width:98.3594px;"><p>7.8</p></td><td style="vertical-align:top;width:99.9375px;"><p>HIGH&nbsp;</p></td><td style="vertical-align:top;width:99.8125px;"><p>0.0</p></td><td style="vertical-align:top;width:105.297px;"><p></p><div><pre>0.029</pre></div><p></p></td><td style="vertical-align:top;width:100.328px;"><p>CWE-787<br/></p></td></tr><tr><td style="vertical-align:top;width:174px;"><p>Mitsubishi Electric<br/></p></td><td style="vertical-align:top;width:476px;">Mitsubishi Electric MELSEC iQ-F Series EtherNet/IP module and Ethernet module</td><td style="vertical-align:top;width:159.094px;"><div>CVE-2026-1874</div></td><td style="vertical-align:top;width:98.3594px;">7.5</td><td style="vertical-align:top;width:99.9375px;">HIGH</td><td style="vertical-align:top;width:99.8125px;">0.001 </td><td style="vertical-align:top;width:105.297px;"> 0.338</td><td style="vertical-align:top;width:100.328px;">CWE-670</td></tr><tr><td style="width:174px;">Mitsubishi Electric </td><td style="width:476px;"> Mitsubishi Electric MELSEC iQ-F Series EtherNet/IP module and Ethernet module</td><td style="width:159.094px;"> CVE-2026-1875</td><td style="width:98.3594px;"> 7.5</td><td style="width:99.9375px;"> HIGH</td><td style="width:99.8125px;">0.001<br/></td><td style="width:105.297px;">0.338<br/></td><td style="width:100.328px;">CWE-404 </td></tr><tr><td style="width:174px;"> Mitsubishi Electric</td><td style="width:476px;"> Mitsubishi Electric MELSEC iQ-F Series EtherNet/IP module and Ethernet module</td><td style="width:159.094px;"> CVE-2026-1876</td><td style="width:98.3594px;"> 7.5</td><td style="width:99.9375px;"> HIGH</td><td style="width:99.8125px;"><span><span>0.001</span></span> </td><td style="width:105.297px;"> <span><span>0.338</span></span></td><td style="width:100.328px;">CWE-404  </td></tr><tr><td style="width:174px;"> <span>Hitachi Energy</span></td><td style="width:476px;"> <span>Hitachi Energy Relion REB500 Product</span></td><td style="width:159.094px;"> <span>CVE-2026-2459</span></td><td style="width:98.3594px;"> <span><span>6.5</span></span></td><td style="width:99.9375px;"> Medium</td><td style="width:99.8125px;"> <span>0.000</span></td><td style="width:105.297px;"> <span>0.0845</span></td><td style="width:100.328px;"> <span>CWE-267</span></td></tr><tr><td style="width:174px;"> <span>Hitachi Energy</span></td><td style="width:476px;"> <span>Hitachi Energy Relion REB500 Product</span></td><td style="width:159.094px;"> <span>CVE-2026-2460</span></td><td style="width:98.3594px;"> <span><span>6.5</span></span></td><td style="width:99.9375px;"> <span><span>Medium</span></span></td><td style="width:99.8125px;"> <span>0.000</span></td><td style="width:105.297px;"> <span>0.0845</span></td><td style="width:100.328px;"> <span>CWE-267</span></td></tr><tr><td style="width:174px;"> <span><span>Hitachi Energy</span></span></td><td style="width:476px;"> <span><span>RTU500 series CMU Firmware version 12.7.1 through 12.7.7, RTU500 series CMU Firmware version 13.5.1 through 13.5.4, RTU500 series CMU Firmware version 13.6.1 through 13.6.2, RTU500 series CMU Firmware version 13.7.1 through 13.7.7, RTU500 series CMU Firmware version 13.8.1</span></span></td><td style="width:159.094px;"><div><div>CVE-2026-1772</div></div></td><td style="width:98.3594px;"> <span><span>4.3</span></span></td><td style="width:99.9375px;"> <span><span>Medium</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span>0.155</span></td><td style="width:100.328px;"> <span>&nbsp;CWE-280</span></td></tr><tr><td style="width:174px;"> <span><span>Hitachi Energy</span></span></td><td style="width:476px;"> <span>RTU500 series CMU Firmware version 12.7.1 through 12.7.7, RTU500 series CMU Firmware version 13.5.1 through 13.5.4, RTU500 series CMU Firmware version 13.6.1 through 13.6.2, RTU500 series CMU Firmware version 13.7.1 through 13.7.7, RTU500 series CMU Firmware version 13.8.1</span></td><td style="width:159.094px;"><div><div>CVE-2026-1773</div></div></td><td style="width:98.3594px;">7.5 </td><td style="width:99.9375px;"> High</td><td style="width:99.8125px;"><span><span> 0.000</span></span> </td><td style="width:105.297px;"> <span>0.219</span></td><td style="width:100.328px;"><span>CWE-184</span> </td></tr><tr><td style="width:174px;"> <span><span>Hitachi Energy</span></span></td><td style="width:476px;"> <span>RTU500 series CMU Firmware version 12.7.1 through 12.7.7, RTU500 series CMU Firmware version 13.5.1 through 13.5.4, RTU500 series CMU Firmware version 13.6.1 through 13.6.2, RTU500 series CMU Firmware version 13.7.1 through 13.7.7, RTU500 series CMU Firmware version 13.8.1</span></td><td style="width:159.094px;"><div><div><span style="font-family:inherit;font-size:inherit;">CVE-2024-8176</span></div></div></td><td style="width:98.3594px;"> <span><span>7.5</span></span></td><td style="width:99.9375px;"><span><span>High</span></span> </td><td style="width:99.8125px;"> <span><span> <span>0.004</span></span></span></td><td style="width:105.297px;"> <span>0.613</span></td><td style="width:100.328px;"> <span>CWE-674</span></td></tr><tr><td style="width:174px;"> <span><span>Hitachi Energy</span></span></td><td style="width:476px;"> <span>RTU500 series CMU Firmware version 12.7.1 through 12.7.7, RTU500 series CMU Firmware version 13.5.1 through 13.5.4, RTU500 series CMU Firmware version 13.6.1 through 13.6.2, RTU500 series CMU Firmware version 13.7.1 through 13.7.7, RTU500 series CMU Firmware version 13.8.1</span></td><td style="width:159.094px;"> CVE-2025-59375</td><td style="width:98.3594px;"><span><span>7.5</span></span> </td><td style="width:99.9375px;"> <span><span>High</span></span></td><td style="width:99.8125px;"><span><span> 0.000</span></span> </td><td style="width:105.297px;"> <span>0.155</span></td><td style="width:100.328px;"> <span>CWE-770</span></td></tr><tr><td style="width:174px;"> <span>Portwell</span></td><td style="width:476px;"> <span>Portwell Engineering Toolkits</span></td><td style="width:159.094px;"> <span>CVE-2026-3437</span></td><td style="width:98.3594px;">8.8</td><td style="width:99.9375px;">High</td><td style="width:99.8125px;"> <span><span> 0.000 </span></span></td><td style="width:105.297px;"> <span>0.0258</span></td><td style="width:100.328px;"> <span>CWE-119</span></td></tr><tr><td style="width:174px;"> <span>Labkotec</span></td><td style="width:476px;"> <span>Labkotec LID-3300IP</span></td><td style="width:159.094px;"> <span>CVE-2026-1775</span></td><td style="width:98.3594px;"> <span>9.4</span></td><td style="width:99.9375px;"> Critical</td><td style="width:99.8125px;"> <span><span>  0.000</span></span></td><td style="width:105.297px;"><span>0.026</span> </td><td style="width:100.328px;"> <span>CWE-306</span></td></tr><tr><td style="width:174px;"> <span>Mobiliti</span></td><td style="width:476px;"> <span>Mobiliti e-mobi.hu</span></td><td style="width:159.094px;"><div><div>CVE-2026-26051</div></div></td><td style="width:98.3594px;"> <span>9.4</span></td><td style="width:99.9375px;"> <span>Critical</span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span>0.275</span></td><td style="width:100.328px;"><span>&nbsp;<span><span> CWE-306</span></span></span></td></tr><tr style="height:46.3281px;"><td style="width:174px;"> <span><span>Mobiliti</span></span></td><td style="width:476px;"> <span><span>Mobiliti e-mobi.hu</span></span></td><td style="width:159.094px;"> CVE-2026-20882<div><div></div></div></td><td style="width:98.3594px;"> 7.5</td><td style="width:99.9375px;">High</td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span>0.176</span></td><td style="width:100.328px;"> <span><span> CWE-307</span></span></td></tr><tr><td style="width:174px;"> <span><span>Mobiliti</span></span></td><td style="width:476px;"> <span><span>Mobiliti e-mobi.hu</span></span></td><td style="width:159.094px;"> CVE-2026-27764</td><td style="width:98.3594px;"> 7.3</td><td style="width:99.9375px;"> <span><span>High</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span>0.102</span></td><td style="width:100.328px;"> <span> CWE-613</span></td></tr><tr><td style="width:174px;"> <span><span>Mobiliti</span></span></td><td style="width:476px;"> <span><span>Mobiliti e-mobi.hu</span></span></td><td style="width:159.094px;"><div><div><span style="font-family:inherit;font-size:inherit;">CVE-2026-27777</span></div></div></td><td style="width:98.3594px;"> 6.5</td><td style="width:99.9375px;">Medium</td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span>0.128</span></td><td style="width:100.328px;"> <span>CWE-522</span></td></tr><tr><td style="width:174px;"><span>ePower</span></td><td style="width:476px;"> <span>ePower epower.ie</span></td><td style="width:159.094px;"> CVE-2026-22552</td><td style="width:98.3594px;"> <span><span> 9.4</span></span></td><td style="width:99.9375px;"> <span><span>Critical</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span> 0.275</span></span></td><td style="width:100.328px;"> <span>CWE-306</span></td></tr><tr><td style="width:174px;"> <span>ePower</span></td><td style="width:476px;"> <span>ePower epower.ie</span></td><td style="width:159.094px;"><div><div><span style="font-family:inherit;font-size:inherit;">CVE-2026-27778</span></div></div></td><td style="width:98.3594px;"> <span>7.5</span></td><td style="width:99.9375px;"> <span><span>High</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span>0.176</span></span></td><td style="width:100.328px;"> <span>CWE-307</span></td></tr><tr><td style="width:174px;"> <span>ePower</span></td><td style="width:476px;"> <span>ePower epower.ie</span><span>ePower epower.ie</span></td><td style="width:159.094px;"><div><div><span style="font-family:inherit;font-size:inherit;">CVE-2026-24912</span></div></div></td><td style="width:98.3594px;"> <span><span>7.3</span></span></td><td style="width:99.9375px;"> <span><span>High</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span>0.102</span></span></td><td style="width:100.328px;"> <span>CWE-613</span></td></tr><tr><td style="width:174px;"> <span>ePower</span></td><td style="width:476px;"> <span>ePower epower.ie</span></td><td style="width:159.094px;"> CVE-2026-27770</td><td style="width:98.3594px;"> <span>6.5</span></td><td style="width:99.9375px;"> <span>Medium</span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span>0.128</span></span></td><td style="width:100.328px;"> <span><span> CWE-522</span></span></td></tr><tr><td style="width:174px;"> <span><span>Everon</span></span></td><td style="width:476px;"> <span><span>Everon OCPP Backends</span></span></td><td style="width:159.094px;"> CVE-2026-26288</td><td style="width:98.3594px;"> <span><span>9.4</span></span></td><td style="width:99.9375px;"> <span><span>Critical</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span>0.275</span></span></td><td style="width:100.328px;"> <span><span>CWE-306</span></span></td></tr><tr><td style="width:174px;"> <span><span>Everon</span></span></td><td style="width:476px;"> <span><span>Everon OCPP Backends</span></span></td><td style="width:159.094px;"> CVE-2026-24696<div></div></td><td style="width:98.3594px;"> <span><span>7.5</span></span></td><td style="width:99.9375px;"> <span><span>High</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span>0.176</span></span></td><td style="width:100.328px;"> <span><span> CWE-307</span></span></td></tr><tr style="height:60.3281px;"><td style="width:174px;"> <span><span>Everon</span></span></td><td style="width:476px;"> <span><span>Everon OCPP Backends</span></span></td><td style="width:159.094px;"> CVE-2026-20748<div></div></td><td style="width:98.3594px;"> <span><span>7.5</span></span></td><td style="width:99.9375px;"> <span><span>High</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span>0.102</span></span></td><td style="width:100.328px;"> <span><span> CWE-613</span></span></td></tr><tr><td style="width:174px;"> <span><span>Everon</span></span></td><td style="width:476px;"> <span><span>Everon OCPP Backends</span></span></td><td style="width:159.094px;"><div><div><span style="font-family:inherit;font-size:inherit;">CVE-2026-27027</span></div></div></td><td style="width:98.3594px;"> <span><span>6.5</span></span></td><td style="width:99.9375px;"> <span><span>Medium</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span>0.128</span></span></td><td style="width:100.328px;"><span><span> CWE-522</span></span> </td></tr><tr><td style="width:174px;"><span>Delta Electronics</span></td><td style="width:476px;"> <span>Delta Electronics CNCSoft-G2</span></td><td style="width:159.094px;"> <span>CVE-2026-3094</span></td><td style="width:98.3594px;"> 7.8</td><td style="width:99.9375px;">High</td><td style="width:99.8125px;" class="zp-selected-cell"> <span> 0.000</span></td><td style="width:105.297px;"> <span>0.029</span></td><td style="width:100.328px;"> <span>CWE-787</span></td></tr></tbody></table></div><p></p></div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br/></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br/>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de décembre 2025</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;">- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div></div><br/><p></p></div><p></p></div><p></p></div><p></p></div><p></p></div><p></p></div><p></p></div></div></div></div></div><div><div><div><div><p></p></div>
</div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 09 Mar 2026 09:55:59 +0100</pubDate></item></channel></rss>