<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.fortress-cybersecurity.fr/blogs/newsletter/feed" rel="self" type="application/rss+xml"/><title>Site Institutionnel - Blog , newsletter</title><description>Site Institutionnel - Blog , newsletter</description><link>https://www.fortress-cybersecurity.fr/blogs/newsletter</link><lastBuildDate>Fri, 13 Mar 2026 17:39:41 +0100</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S11]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s11</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Cybermenaces dans l’industrie automobile L’article explique que la transformation numérique du secteur automobile (véhicules connectés, systèmes téléma ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div><div><div><div><div><div><div><p style="font-weight:bold;margin-bottom:13.3333px;"><strong><strong>Cybermenaces dans l’industrie automobile</strong></strong></p><div><p><span>L’article explique que la transformation numérique du secteur automobile (véhicules connectés, systèmes télématiques, réseaux de recharge pour véhicules électriques et chaînes d’approvisionnement digitalisées) crée de nouvelles surfaces d’attaque pour les acteurs de la menace. Il montre comment des malwares et ransomwares peuvent perturber non seulement les systèmes IT des constructeurs, mais aussi des éléments critiques comme les mises à jour logicielles des véhicules, les services connectés ou l’écosystème des véhicules électriques. Des risques concrets ont été illustrés : ralentissement des activités d’un concessionnaire à cause d’un malware, vulnérabilités liées aux mises à jour de véhicules connectés ou perturbations dans la chaîne logistique.</span></p></div><a href="https://www.bitsight.com/blog/automotive-cyber-threats-ransomware-malware-trends" title="https://www.bitsight.com/blog/automotive-cyber-threats-ransomware-malware-trends" rel="">https://www.bitsight.com/blog/automotive-cyber-threats-ransomware-malware-trends</a><br/></div></div></div></div><p></p><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span><span><span><span><span><span><span><span><span><span><strong>Rapport Cisco 2026 l'état de l'IA dans le monde industriel</strong></span></span></span><span></span></span></span></span></span></span></span></span></span></p></div>
<div><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><p style="margin-bottom:13.3333px;"><span><span>L’étude s’appuie sur des données recueillies auprès d’entreprises du monde entier, avec environ 1 000 professionnels de l’industrie interrogés. Elle montre que l’IA occupe désormais une place importante dans des processus critiques, notamment l’automatisation des processus et l’inspection automatisée de la qualité. Environ 70 % des professionnels déclarent avoir déployé de manière mature des solutions d’IA dans ces domaines. Cependant, cette adoption soulève aussi des questions d’exposition aux menaces. Le paradoxe est que, malgré ce niveau de maturité, 40 % des répondants estiment que le principal frein au déploiement reste la cybersécurité.</span></span></p><a href="https://www.cisco.com/c/dam/en/us/solutions/networking/industrial-iot/2026-state-of-industrial-ai-report.pdf" title="https://www.cisco.com/c/dam/en/us/solutions/networking/industrial-iot/2026-state-of-industrial-ai-report.pdf" rel="">https://www.cisco.com/c/dam/en/us/solutions/networking/industrial-iot/2026-state-of-industrial-ai-report.pdf</a><br/><p></p><strong><p style="margin-bottom:13.3333px;line-height:2;"></p></strong><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnerability&nbsp;Corner :</span>&nbsp;</p><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:144px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:141.25px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:202.266px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:720.734px;"><div><div><p><span>Liens&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22054" target="_blank" rel="noreferrer noopener"><span>CVE-2021-22054</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:141.25px;"><div><div><p><span>Omnissa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:202.266px;"><div><div><p><span>Workspace One UEM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:720.734px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22054%2C%20https%3A//web.archive.org/web/20211222154335/https%3A//www.vmware.com/security/advisories/VMSA-2021-0029.html" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2021-22054, https://web.archive.org/web/20211222154335/https://www.vmware.com/security/advisories/VMSA-2021-0029.html</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-26399" target="_blank" rel="noreferrer noopener"><span>CVE-2025-26399</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:141.25px;"><div><div><p><span>SolarWinds&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:202.266px;"><div><div><p><span>Web Help Desk&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:720.734px;"><div><div><p><span></span><a href="https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_12-8-7-hotfix-1_release_notes.htm%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-26399%2C%20https%3A//www.solarwinds.com/trust-center/security-advisories/cve-2025-26399" target="_blank" rel="noreferrer noopener"><span>https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_12-8-7-hotfix-1_release_notes.htm, https://nvd.nist.gov/vuln/detail/CVE-2025-26399, https://www.solarwinds.com/trust-center/security-advisories/cve-2025-26399</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68613" target="_blank" rel="noreferrer noopener"><span>CVE-2025-68613</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:141.25px;"><div><div><p><span>n8n&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:202.266px;"><div><div><p><span>n8n&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:720.734px;"><div><div><p><span></span><a href="https://github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-68613" target="_blank" rel="noreferrer noopener"><span>https://github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp, https://nvd.nist.gov/vuln/detail/CVE-2025-68613</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1603" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1603</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:141.25px;"><div><div><p><span>Ivanti&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:202.266px;"><div><div><p><span>&nbsp;Endpoint Manager (EPM)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:720.734px;"><div><div><p><span></span><a href="https://hub.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024?language=en_US%2C%20https%3A%2F%2Fnvd.nist.gov%2Fvuln%2Fdetail%2FCVE-2026-1603" target="_blank" rel="noreferrer noopener"><span>https://hub.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024?language=en_US, https://nvd.nist.gov/vuln/detail/CVE-2026-1603</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>Critical&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>High&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>Medium&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>Low&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>Total&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>Heliox Flex 180 kW EV Charging&nbsp;Station,RUGGEDCOM&nbsp;APE1808,SIDIS&nbsp;Prime,SIMATIC&nbsp;Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>13&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>13&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>29&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Lantronix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>8&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Trane&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>Tracer SC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>5&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Apeman&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>ID71&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>3&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Inductive Automation&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>Ignition Software&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Ceragon&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>MultiHaul&nbsp;MH-B100-CCS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:183px;"><div><div><p><span>Honeywell&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:586px;"><div><div><p><span>IQ4E&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.719px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82.875px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.359px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.062px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:85.4062px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Score&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Severity&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EPSS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Percentile&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CWE&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Honeywell&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>IQ4E&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3611" target="_blank" rel="noreferrer noopener"><span>CVE-2026-3611</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>10.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Apeman&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ID71&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11126" target="_blank" rel="noreferrer noopener"><span>CVE-2025-11126</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.180%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>39.342%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67038" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67038</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.773%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67039" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67039</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.034%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.739%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/288.html" target="_blank" rel="noreferrer noopener"><span>CWE-288</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>RUGGEDCOM APE1808&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24858" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24858</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.776%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>85.865%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/288.html" target="_blank" rel="noreferrer noopener"><span>CWE-288</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIMATIC Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40943" target="_blank" rel="noreferrer noopener"><span>CVE-2025-40943</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.041%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>12.336%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer noopener"><span>CWE-79</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-7783" target="_blank" rel="noreferrer noopener"><span>CVE-2025-7783</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.7&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.177%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>38.929%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/330.html" target="_blank" rel="noreferrer noopener"><span>CWE-330</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-12816" target="_blank" rel="noreferrer noopener"><span>CVE-2025-12816</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.059%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>18.361%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/436.html" target="_blank" rel="noreferrer noopener"><span>CWE-436</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66035" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66035</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.075%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>22.465%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/201.html" target="_blank" rel="noreferrer noopener"><span>CWE-201</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Trane&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Tracer SC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28252" target="_blank" rel="noreferrer noopener"><span>CVE-2026-28252</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/327.html" target="_blank" rel="noreferrer noopener"><span>CWE-327</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66412" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66412</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.039%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>11.354%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer noopener"><span>CWE-79</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22610" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22610</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.014%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.383%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer noopener"><span>CWE-79</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-6965" target="_blank" rel="noreferrer noopener"><span>CVE-2025-6965</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.7&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.072%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>21.786%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/197.html" target="_blank" rel="noreferrer noopener"><span>CWE-197</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-29857" target="_blank" rel="noreferrer noopener"><span>CVE-2024-29857</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.337%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>56.144%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener"><span>CWE-125</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-30172" target="_blank" rel="noreferrer noopener"><span>CVE-2024-30172</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.136%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>33.229%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/20.html" target="_blank" rel="noreferrer noopener"><span>CWE-20</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41996" target="_blank" rel="noreferrer noopener"><span>CVE-2024-41996</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.430%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>62.198%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/295.html" target="_blank" rel="noreferrer noopener"><span>CWE-295</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-15284" target="_blank" rel="noreferrer noopener"><span>CVE-2025-15284</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.193%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>40.993%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/20.html" target="_blank" rel="noreferrer noopener"><span>CWE-20</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58754" target="_blank" rel="noreferrer noopener"><span>CVE-2025-58754</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.102%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>27.909%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/770.html" target="_blank" rel="noreferrer noopener"><span>CWE-770</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64756" target="_blank" rel="noreferrer noopener"><span>CVE-2025-64756</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.038%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>11.294%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66031" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66031</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.115%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>30.056%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/674.html" target="_blank" rel="noreferrer noopener"><span>CWE-674</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Trane&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Tracer SC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28253" target="_blank" rel="noreferrer noopener"><span>CVE-2026-28253</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/789.html" target="_blank" rel="noreferrer noopener"><span>CWE-789</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67034" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67034</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.773%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67035" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67035</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.773%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67036" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67036</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.773%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67037" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67037</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.773%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67041" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67041</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.044%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>13.196%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Trane&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Tracer SC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28255" target="_blank" rel="noreferrer noopener"><span>CVE-2026-28255</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/798.html" target="_blank" rel="noreferrer noopener"><span>CWE-798</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>RUGGEDCOM APE1808&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64157" target="_blank" rel="noreferrer noopener"><span>CVE-2025-64157</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.7&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.826%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/134.html" target="_blank" rel="noreferrer noopener"><span>CWE-134</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-62522" target="_blank" rel="noreferrer noopener"><span>CVE-2025-62522</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.016%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>83.540%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/22.html" target="_blank" rel="noreferrer noopener"><span>CWE-22</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Inductive Automation&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Ignition Software&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13913" target="_blank" rel="noreferrer noopener"><span>CVE-2025-13913</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/502.html" target="_blank" rel="noreferrer noopener"><span>CWE-502</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-30171" target="_blank" rel="noreferrer noopener"><span>CVE-2024-30171</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.9&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.100%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>27.724%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/203.html" target="_blank" rel="noreferrer noopener"><span>CWE-203</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9232" target="_blank" rel="noreferrer noopener"><span>CVE-2025-9232</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.9&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.033%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.182%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener"><span>CWE-125</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>RUGGEDCOM APE1808&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-55018" target="_blank" rel="noreferrer noopener"><span>CVE-2025-55018</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.053%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>16.404%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/444.html" target="_blank" rel="noreferrer noopener"><span>CWE-444</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Trane&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Tracer SC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28254" target="_blank" rel="noreferrer noopener"><span>CVE-2026-28254</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer noopener"><span>CWE-862</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Trane&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Tracer SC&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-28256" target="_blank" rel="noreferrer noopener"><span>CVE-2026-28256</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/547.html" target="_blank" rel="noreferrer noopener"><span>CWE-547</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9230" target="_blank" rel="noreferrer noopener"><span>CVE-2025-9230</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.031%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.655%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/787.html" target="_blank" rel="noreferrer noopener"><span>CWE-787</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Apeman&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ID71&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11852" target="_blank" rel="noreferrer noopener"><span>CVE-2025-11852</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.073%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>22.012%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Ceragon&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MultiHaul&nbsp;MH-B100-CCS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-57176" target="_blank" rel="noreferrer noopener"><span>CVE-2025-57176</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.663%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>70.878%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/434.html" target="_blank" rel="noreferrer noopener"><span>CWE-434</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64718" target="_blank" rel="noreferrer noopener"><span>CVE-2025-64718</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.020%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.992%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/1321.html" target="_blank" rel="noreferrer noopener"><span>CWE-1321</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66030" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66030</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.042%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>12.433%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/190.html" target="_blank" rel="noreferrer noopener"><span>CWE-190</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9670" target="_blank" rel="noreferrer noopener"><span>CVE-2025-9670</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.051%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>15.546%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/1333.html" target="_blank" rel="noreferrer noopener"><span>CWE-1333</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-69277" target="_blank" rel="noreferrer noopener"><span>CVE-2025-69277</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.007%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.597%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/184.html" target="_blank" rel="noreferrer noopener"><span>CWE-184</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58751" target="_blank" rel="noreferrer noopener"><span>CVE-2025-58751</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.421%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>80.382%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/22.html" target="_blank" rel="noreferrer noopener"><span>CWE-22</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIDIS Prime&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58752" target="_blank" rel="noreferrer noopener"><span>CVE-2025-58752</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.016%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.513%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/23.html" target="_blank" rel="noreferrer noopener"><span>CWE-23</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>RUGGEDCOM APE1808&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-62439" target="_blank" rel="noreferrer noopener"><span>CVE-2025-62439</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.901%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/940.html" target="_blank" rel="noreferrer noopener"><span>CWE-940</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Apeman&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ID71&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11851" target="_blank" rel="noreferrer noopener"><span>CVE-2025-11851</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.052%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>16.124%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer noopener"><span>CWE-79</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Lantronix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EDS3000PS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-70082" target="_blank" rel="noreferrer noopener"><span>CVE-2025-70082</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.7&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.066%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>20.274%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/620.html" target="_blank" rel="noreferrer noopener"><span>CWE-620</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Heliox Flex 180 kW EV Charging Station&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-27769" target="_blank" rel="noreferrer noopener"><span>CVE-2025-27769</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.014%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.550%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/923.html" target="_blank" rel="noreferrer noopener"><span>CWE-923</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br/></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br/>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de janvier 2025</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div></div><br/><p></p></div><div><p></p></div><p></p></div><div><p></p></div><p></p></div><p></p></div><p></p></div><p></p></div><p></p></div><p></p></div></div></div></div></div><div><div><div><div><p></p></div>
</div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 13 Mar 2026 15:48:19 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S10]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s10</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>0.000 Les paiements liés aux ransomwares diminuent Les chercheurs en cybersécurité ont observés une augmentation de 50% du nombre de victimes de ransomw ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><span>0.000</span><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span></span></span></span></span><div><div><div><p style="margin-bottom:13.3333px;"></p><div><div><div><p style="font-weight:bold;margin-bottom:13.3333px;"><strong>Les paiements liés aux ransomwares diminuent</strong></p><div><p>Les chercheurs en cybersécurité ont observés une augmentation de 50% du nombre de victimes de ransomware. Pourtant les paiements liés aux ransomwares diminuent de 8%. L'article explique que les entreprises refusent de plus en plus de payer, grâce à de meilleures stratégies de réponse et de surveillance, une pression accrue des autorités contre les opérateurs de ransomware, les infrastructures et des faiblesses cryptographique qui permet au victime de décrypter les données comme avec le ransomware VolkLocker.</p></div><a href="https://www.infosecurity-magazine.com/news/ransomware-payments-decline-1/" title="https://www.infosecurity-magazine.com/news/ransomware-payments-decline-1/" rel="">https://www.infosecurity-magazine.com/news/ransomware-payments-decline-1/</a><br/></div></div></div><p></p><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span><span><span><span><span><span><span><span>Cybermenaces dans l’industrie pharmaceutique</span><span></span></span></span></span></span></span></span></span></span></p></div>
<div><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><p style="margin-bottom:13.3333px;">L’industrie pharmaceutique est une cible privilégiée des cyberattaques en raison de la valeur élevée de sa propriété intellectuelle et des données de santé sensibles qu’elle détient. Elle est exposée à plusieurs risques, comme le vol de données, les attaques de la chaîne d’approvisionnement, les erreurs humaines ou encore les vulnérabilités liées aux systèmes anciens et aux environnements cloud complexes.</p><a href="https://www.hornetsecurity.com/en/blog/cyber-threats-to-pharmaceutical-industry/" title="https://www.hornetsecurity.com/en/blog/cyber-threats-to-pharmaceutical-industry/" rel="">https://www.hornetsecurity.com/en/blog/cyber-threats-to-pharmaceutical-industry/</a><p></p><strong><p style="margin-bottom:13.3333px;line-height:2;"></p></strong><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnerability&nbsp;Corner :</span>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:152px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span>Liens&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:152px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-7921" target="_blank" rel="noreferrer noopener"><span>CVE-2017-7921</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Hikvision&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>Multiple Products&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-7921%2C%20https%3A//www.hikvision.com/us-en/support/document-center/special-notices/privilege-escalating-vulnerability-in-certain-hikvision-ip-cameras/" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2017-7921, https://www.hikvision.com/us-en/support/document-center/special-notices/privilege-escalating-vulnerability-in-certain-hikvision-ip-cameras/</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:152px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22681" target="_blank" rel="noreferrer noopener"><span>CVE-2021-22681</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Rockwell&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>Multiple Products&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22681%2C%20https%3A//support.rockwellautomation.com/app/answers/answer_view/a_id/1130301/%7E/cve-2021-22681%3A-authentication-bypass-vulnerability-found-in-logix-controllers-%2C%20https%3A//www.cisa.gov/news-events/ics-advisories/icsa-21-056-03" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2021-22681, https://support.rockwellautomation.com/app/answers/answer_view/a_id/1130301/~/cve-2021-22681%3A-authentication-bypass-vulnerability-found-in-logix-controllers-, https://www.cisa.gov/news-events/ics-advisories/icsa-21-056-03</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:152px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-30952" target="_blank" rel="noreferrer noopener"><span>CVE-2021-30952</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Apple&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>Multiple Products&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-30952%2C%20https%3A//support.apple.com/en-us/HT212975%2C%20https%3A//support.apple.com/en-us/HT212976%2C%20https%3A//support.apple.com/en-us/HT212978%2C%20https%3A//support.apple.com/en-us/HT212980%2C%20https%3A//support.apple.com/en-us/HT212982" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2021-30952, https://support.apple.com/en-us/HT212975, https://support.apple.com/en-us/HT212976, https://support.apple.com/en-us/HT212978, https://support.apple.com/en-us/HT212980, https://support.apple.com/en-us/HT212982</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:152px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-41974" target="_blank" rel="noreferrer noopener"><span>CVE-2023-41974</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Apple&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>iOS and iPadOS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-41974%2C%20https%3A//support.apple.com/en-us/HT213938%2C%20https%3A//support.apple.com/kb/HT213938" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2023-41974, https://support.apple.com/en-us/HT213938, https://support.apple.com/kb/HT213938</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:152px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-43000" target="_blank" rel="noreferrer noopener"><span>CVE-2023-43000</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Apple&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>Multiple Products&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-43000%2C%20https%3A//support.apple.com/en-us/120324%2C%20https%3A//support.apple.com/en-us/120331%2C%20https%3A//support.apple.com/en-us/120338" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2023-43000, https://support.apple.com/en-us/120324, https://support.apple.com/en-us/120331, https://support.apple.com/en-us/120338</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:152px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21385" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21385</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Qualcomm&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>Multiple Chipsets&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21385%2C%20https%3A//source.android.com/docs/security/bulletin/2026/2026-03-01" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2026-21385, https://source.android.com/docs/security/bulletin/2026/2026-03-01</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:152px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22719" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22719</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:140.859px;"><div><div><p><span>Broadcom&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:170.328px;"><div><div><p><span>VMware Aria Operations&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:830.672px;"><div><div><p><span></span><a href="https://knowledge.broadcom.com/external/article/430349%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-22719%2C%20https%3A//support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947" target="_blank" rel="noreferrer noopener"><span>https://knowledge.broadcom.com/external/article/430349, https://nvd.nist.gov/vuln/detail/CVE-2026-22719, https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"></p><table border="1"><tbody><tr><td style="vertical-align:top;width:216px;"><p><strong>Vendor&nbsp;</strong></p></td><td style="vertical-align:top;width:522px;"><p><strong>Product&nbsp;</strong></p></td><td style="vertical-align:top;width:125.547px;"><p><strong>Critical&nbsp;</strong></p></td><td style="vertical-align:top;width:110.422px;"><p><strong>High&nbsp;</strong></p></td><td style="vertical-align:top;width:120.938px;"><p><strong>Medium&nbsp;</strong></p></td><td style="vertical-align:top;width:131px;"><p><strong>Low&nbsp;</strong></p></td><td style="vertical-align:top;width:91px;"><p><strong>Total&nbsp;</strong></p></td></tr><tr><td style="width:216px;"> <span>Mobiliti</span></td><td style="width:522px;"> <span>Mobiliti e-mobi.hu</span></td><td style="width:125.547px;"> 1</td><td style="width:110.422px;">2</td><td style="width:120.938px;">1</td><td style="width:131px;">0</td><td style="width:91px;">4</td></tr><tr><td style="width:216px;"> <span> Everon</span></td><td style="width:522px;"> <span><span> Everon OCPP Backends</span></span></td><td style="width:125.547px;"> 1</td><td style="width:110.422px;">2</td><td style="width:120.938px;">1</td><td style="width:131px;">0</td><td style="width:91px;">4</td></tr><tr><td style="width:216px;"><span><span>ePower</span></span></td><td style="width:522px;"><span>ePower epower.ie</span></td><td style="width:125.547px;">1</td><td style="width:110.422px;">2</td><td style="width:120.938px;">1</td><td style="width:131px;">0</td><td style="width:91px;">4</td></tr><tr><td style="width:216px;"> <span><span>Labkotec</span></span></td><td style="width:522px;"> <span>Labkotec LID-3300IP</span></td><td style="width:125.547px;"> 1</td><td style="width:110.422px;">0</td><td style="width:120.938px;">0</td><td style="width:131px;">0</td><td style="width:91px;">1</td></tr><tr><td style="width:216px;"> <span>Hitachi Energy</span></td><td style="width:522px;"> <span> RTU500 series CMU Firmware version 12.7.1 through 12.7.7, RTU500 series CMU Firmware version 13.5.1 through 13.5.4, RTU500 series CMU Firmware version 13.6.1 through 13.6.2, RTU500 series CMU Firmware version 13.7.1 through 13.7.7, RTU500 series CMU Firmware version 13.8.1</span></td><td style="width:125.547px;">0</td><td style="width:110.422px;">3</td><td style="width:120.938px;">1</td><td style="width:131px;"> 0</td><td style="width:91px;"> 4</td></tr><tr><td style="width:216px;"> <span><span>Mitsubishi Electric</span></span></td><td style="width:522px;"><span><span>Mitsubishi Electric MELSEC iQ-F Series EtherNet/IP module and Ethernet module</span></span> </td><td style="width:125.547px;"> 0</td><td style="width:110.422px;">3</td><td style="width:120.938px;">0</td><td style="width:131px;">0</td><td style="width:91px;">1</td></tr><tr><td style="width:216px;"> <span>Portwell</span></td><td style="width:522px;"> <span><span> Portwell Engineering Toolkits</span></span></td><td style="width:125.547px;"> 0</td><td style="width:110.422px;">1</td><td style="width:120.938px;">0</td><td style="width:131px;">0</td><td style="width:91px;">1</td></tr><tr><td style="width:216px;"><span>Delta Electronics</span></td><td style="width:522px;"> <span>Delta Electronics CNCSoft-G2</span></td><td style="width:125.547px;"> 0</td><td style="width:110.422px;">1</td><td style="width:120.938px;">0</td><td style="width:131px;">0</td><td style="width:91px;">1</td></tr><tr><td style="vertical-align:top;width:216px;"><p>Delta Electronics&nbsp;</p></td><td style="vertical-align:top;width:522px;"><p>EVMAPA&nbsp;</p></td><td style="vertical-align:top;width:125.547px;"><p>0</p></td><td style="vertical-align:top;width:110.422px;"><p>1</p></td><td style="vertical-align:top;width:120.938px;"><p>0&nbsp;</p></td><td style="vertical-align:top;width:131px;"><p>0&nbsp;</p></td><td style="vertical-align:top;width:91px;"><p>1</p></td></tr><tr><td style="vertical-align:top;width:216px;"><p><span><span> Hitachi Energy</span></span><br/></p></td><td style="vertical-align:top;width:522px;"><span><span>CVE-2026-2460</span></span><br/></td><td style="vertical-align:top;width:125.547px;">0</td><td style="vertical-align:top;width:110.422px;">0</td><td style="vertical-align:top;width:120.938px;">2</td><td style="vertical-align:top;width:131px;">0</td><td style="vertical-align:top;width:91px;">2</td></tr></tbody></table><p></p></div><div><p style="margin-bottom:13.3333px;"><br/></p><p style="margin-bottom:13.3333px;">Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"><span></span></p><div><table border="1"><tbody><tr><td style="vertical-align:top;width:174px;"><p><strong>Vendor&nbsp;</strong></p></td><td style="vertical-align:top;width:476px;"><p><strong>Product&nbsp;</strong></p></td><td style="vertical-align:top;width:159.094px;"><p><strong>CVE&nbsp;</strong></p></td><td style="vertical-align:top;width:98.3594px;"><p><strong>CVSSv3 Score&nbsp;</strong></p></td><td style="vertical-align:top;width:99.9375px;"><p><strong>CVSSv3 Severity&nbsp;</strong></p></td><td style="vertical-align:top;width:99.8125px;"><p><strong>EPSS&nbsp;</strong></p></td><td style="vertical-align:top;width:105.297px;"><p><strong>Percentile&nbsp;</strong></p></td><td style="vertical-align:top;width:100.328px;"><p><strong>CWE&nbsp;</strong></p></td></tr><tr><td style="vertical-align:top;width:174px;"><p>Delta Electronics&nbsp;</p></td><td style="vertical-align:top;width:476px;"><p>EVMAPA&nbsp;</p></td><td style="vertical-align:top;width:159.094px;"><p>CVE-2026-3094<br/></p></td><td style="vertical-align:top;width:98.3594px;"><p>7.8</p></td><td style="vertical-align:top;width:99.9375px;"><p>HIGH&nbsp;</p></td><td style="vertical-align:top;width:99.8125px;"><p>0.0</p></td><td style="vertical-align:top;width:105.297px;"><p></p><div><pre>0.029</pre></div><p></p></td><td style="vertical-align:top;width:100.328px;"><p>CWE-787<br/></p></td></tr><tr><td style="vertical-align:top;width:174px;"><p>Mitsubishi Electric<br/></p></td><td style="vertical-align:top;width:476px;">Mitsubishi Electric MELSEC iQ-F Series EtherNet/IP module and Ethernet module</td><td style="vertical-align:top;width:159.094px;"><div>CVE-2026-1874</div></td><td style="vertical-align:top;width:98.3594px;">7.5</td><td style="vertical-align:top;width:99.9375px;">HIGH</td><td style="vertical-align:top;width:99.8125px;">0.001 </td><td style="vertical-align:top;width:105.297px;"> 0.338</td><td style="vertical-align:top;width:100.328px;">CWE-670</td></tr><tr><td style="width:174px;">Mitsubishi Electric </td><td style="width:476px;"> Mitsubishi Electric MELSEC iQ-F Series EtherNet/IP module and Ethernet module</td><td style="width:159.094px;"> CVE-2026-1875</td><td style="width:98.3594px;"> 7.5</td><td style="width:99.9375px;"> HIGH</td><td style="width:99.8125px;">0.001<br/></td><td style="width:105.297px;">0.338<br/></td><td style="width:100.328px;">CWE-404 </td></tr><tr><td style="width:174px;"> Mitsubishi Electric</td><td style="width:476px;"> Mitsubishi Electric MELSEC iQ-F Series EtherNet/IP module and Ethernet module</td><td style="width:159.094px;"> CVE-2026-1876</td><td style="width:98.3594px;"> 7.5</td><td style="width:99.9375px;"> HIGH</td><td style="width:99.8125px;"><span><span>0.001</span></span> </td><td style="width:105.297px;"> <span><span>0.338</span></span></td><td style="width:100.328px;">CWE-404  </td></tr><tr><td style="width:174px;"> <span>Hitachi Energy</span></td><td style="width:476px;"> <span>Hitachi Energy Relion REB500 Product</span></td><td style="width:159.094px;"> <span>CVE-2026-2459</span></td><td style="width:98.3594px;"> <span><span>6.5</span></span></td><td style="width:99.9375px;"> Medium</td><td style="width:99.8125px;"> <span>0.000</span></td><td style="width:105.297px;"> <span>0.0845</span></td><td style="width:100.328px;"> <span>CWE-267</span></td></tr><tr><td style="width:174px;"> <span>Hitachi Energy</span></td><td style="width:476px;"> <span>Hitachi Energy Relion REB500 Product</span></td><td style="width:159.094px;"> <span>CVE-2026-2460</span></td><td style="width:98.3594px;"> <span><span>6.5</span></span></td><td style="width:99.9375px;"> <span><span>Medium</span></span></td><td style="width:99.8125px;"> <span>0.000</span></td><td style="width:105.297px;"> <span>0.0845</span></td><td style="width:100.328px;"> <span>CWE-267</span></td></tr><tr><td style="width:174px;"> <span><span>Hitachi Energy</span></span></td><td style="width:476px;"> <span><span>RTU500 series CMU Firmware version 12.7.1 through 12.7.7, RTU500 series CMU Firmware version 13.5.1 through 13.5.4, RTU500 series CMU Firmware version 13.6.1 through 13.6.2, RTU500 series CMU Firmware version 13.7.1 through 13.7.7, RTU500 series CMU Firmware version 13.8.1</span></span></td><td style="width:159.094px;"><div><div>CVE-2026-1772</div></div></td><td style="width:98.3594px;"> <span><span>4.3</span></span></td><td style="width:99.9375px;"> <span><span>Medium</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span>0.155</span></td><td style="width:100.328px;"> <span>&nbsp;CWE-280</span></td></tr><tr><td style="width:174px;"> <span><span>Hitachi Energy</span></span></td><td style="width:476px;"> <span>RTU500 series CMU Firmware version 12.7.1 through 12.7.7, RTU500 series CMU Firmware version 13.5.1 through 13.5.4, RTU500 series CMU Firmware version 13.6.1 through 13.6.2, RTU500 series CMU Firmware version 13.7.1 through 13.7.7, RTU500 series CMU Firmware version 13.8.1</span></td><td style="width:159.094px;"><div><div>CVE-2026-1773</div></div></td><td style="width:98.3594px;">7.5 </td><td style="width:99.9375px;"> High</td><td style="width:99.8125px;"><span><span> 0.000</span></span> </td><td style="width:105.297px;"> <span>0.219</span></td><td style="width:100.328px;"><span>CWE-184</span> </td></tr><tr><td style="width:174px;"> <span><span>Hitachi Energy</span></span></td><td style="width:476px;"> <span>RTU500 series CMU Firmware version 12.7.1 through 12.7.7, RTU500 series CMU Firmware version 13.5.1 through 13.5.4, RTU500 series CMU Firmware version 13.6.1 through 13.6.2, RTU500 series CMU Firmware version 13.7.1 through 13.7.7, RTU500 series CMU Firmware version 13.8.1</span></td><td style="width:159.094px;"><div><div><span style="font-family:inherit;font-size:inherit;">CVE-2024-8176</span></div></div></td><td style="width:98.3594px;"> <span><span>7.5</span></span></td><td style="width:99.9375px;"><span><span>High</span></span> </td><td style="width:99.8125px;"> <span><span> <span>0.004</span></span></span></td><td style="width:105.297px;"> <span>0.613</span></td><td style="width:100.328px;"> <span>CWE-674</span></td></tr><tr><td style="width:174px;"> <span><span>Hitachi Energy</span></span></td><td style="width:476px;"> <span>RTU500 series CMU Firmware version 12.7.1 through 12.7.7, RTU500 series CMU Firmware version 13.5.1 through 13.5.4, RTU500 series CMU Firmware version 13.6.1 through 13.6.2, RTU500 series CMU Firmware version 13.7.1 through 13.7.7, RTU500 series CMU Firmware version 13.8.1</span></td><td style="width:159.094px;"> CVE-2025-59375</td><td style="width:98.3594px;"><span><span>7.5</span></span> </td><td style="width:99.9375px;"> <span><span>High</span></span></td><td style="width:99.8125px;"><span><span> 0.000</span></span> </td><td style="width:105.297px;"> <span>0.155</span></td><td style="width:100.328px;"> <span>CWE-770</span></td></tr><tr><td style="width:174px;"> <span>Portwell</span></td><td style="width:476px;"> <span>Portwell Engineering Toolkits</span></td><td style="width:159.094px;"> <span>CVE-2026-3437</span></td><td style="width:98.3594px;">8.8</td><td style="width:99.9375px;">High</td><td style="width:99.8125px;"> <span><span> 0.000 </span></span></td><td style="width:105.297px;"> <span>0.0258</span></td><td style="width:100.328px;"> <span>CWE-119</span></td></tr><tr><td style="width:174px;"> <span>Labkotec</span></td><td style="width:476px;"> <span>Labkotec LID-3300IP</span></td><td style="width:159.094px;"> <span>CVE-2026-1775</span></td><td style="width:98.3594px;"> <span>9.4</span></td><td style="width:99.9375px;"> Critical</td><td style="width:99.8125px;"> <span><span>  0.000</span></span></td><td style="width:105.297px;"><span>0.026</span> </td><td style="width:100.328px;"> <span>CWE-306</span></td></tr><tr><td style="width:174px;"> <span>Mobiliti</span></td><td style="width:476px;"> <span>Mobiliti e-mobi.hu</span></td><td style="width:159.094px;"><div><div>CVE-2026-26051</div></div></td><td style="width:98.3594px;"> <span>9.4</span></td><td style="width:99.9375px;"> <span>Critical</span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span>0.275</span></td><td style="width:100.328px;"><span>&nbsp;<span><span> CWE-306</span></span></span></td></tr><tr style="height:46.3281px;"><td style="width:174px;"> <span><span>Mobiliti</span></span></td><td style="width:476px;"> <span><span>Mobiliti e-mobi.hu</span></span></td><td style="width:159.094px;"> CVE-2026-20882<div><div></div></div></td><td style="width:98.3594px;"> 7.5</td><td style="width:99.9375px;">High</td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span>0.176</span></td><td style="width:100.328px;"> <span><span> CWE-307</span></span></td></tr><tr><td style="width:174px;"> <span><span>Mobiliti</span></span></td><td style="width:476px;"> <span><span>Mobiliti e-mobi.hu</span></span></td><td style="width:159.094px;"> CVE-2026-27764</td><td style="width:98.3594px;"> 7.3</td><td style="width:99.9375px;"> <span><span>High</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span>0.102</span></td><td style="width:100.328px;"> <span> CWE-613</span></td></tr><tr><td style="width:174px;"> <span><span>Mobiliti</span></span></td><td style="width:476px;"> <span><span>Mobiliti e-mobi.hu</span></span></td><td style="width:159.094px;"><div><div><span style="font-family:inherit;font-size:inherit;">CVE-2026-27777</span></div></div></td><td style="width:98.3594px;"> 6.5</td><td style="width:99.9375px;">Medium</td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span>0.128</span></td><td style="width:100.328px;"> <span>CWE-522</span></td></tr><tr><td style="width:174px;"><span>ePower</span></td><td style="width:476px;"> <span>ePower epower.ie</span></td><td style="width:159.094px;"> CVE-2026-22552</td><td style="width:98.3594px;"> <span><span> 9.4</span></span></td><td style="width:99.9375px;"> <span><span>Critical</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span> 0.275</span></span></td><td style="width:100.328px;"> <span>CWE-306</span></td></tr><tr><td style="width:174px;"> <span>ePower</span></td><td style="width:476px;"> <span>ePower epower.ie</span></td><td style="width:159.094px;"><div><div><span style="font-family:inherit;font-size:inherit;">CVE-2026-27778</span></div></div></td><td style="width:98.3594px;"> <span>7.5</span></td><td style="width:99.9375px;"> <span><span>High</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span>0.176</span></span></td><td style="width:100.328px;"> <span>CWE-307</span></td></tr><tr><td style="width:174px;"> <span>ePower</span></td><td style="width:476px;"> <span>ePower epower.ie</span><span>ePower epower.ie</span></td><td style="width:159.094px;"><div><div><span style="font-family:inherit;font-size:inherit;">CVE-2026-24912</span></div></div></td><td style="width:98.3594px;"> <span><span>7.3</span></span></td><td style="width:99.9375px;"> <span><span>High</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span>0.102</span></span></td><td style="width:100.328px;"> <span>CWE-613</span></td></tr><tr><td style="width:174px;"> <span>ePower</span></td><td style="width:476px;"> <span>ePower epower.ie</span></td><td style="width:159.094px;"> CVE-2026-27770</td><td style="width:98.3594px;"> <span>6.5</span></td><td style="width:99.9375px;"> <span>Medium</span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span>0.128</span></span></td><td style="width:100.328px;"> <span><span> CWE-522</span></span></td></tr><tr><td style="width:174px;"> <span><span>Everon</span></span></td><td style="width:476px;"> <span><span>Everon OCPP Backends</span></span></td><td style="width:159.094px;"> CVE-2026-26288</td><td style="width:98.3594px;"> <span><span>9.4</span></span></td><td style="width:99.9375px;"> <span><span>Critical</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span>0.275</span></span></td><td style="width:100.328px;"> <span><span>CWE-306</span></span></td></tr><tr><td style="width:174px;"> <span><span>Everon</span></span></td><td style="width:476px;"> <span><span>Everon OCPP Backends</span></span></td><td style="width:159.094px;"> CVE-2026-24696<div></div></td><td style="width:98.3594px;"> <span><span>7.5</span></span></td><td style="width:99.9375px;"> <span><span>High</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span>0.176</span></span></td><td style="width:100.328px;"> <span><span> CWE-307</span></span></td></tr><tr style="height:60.3281px;"><td style="width:174px;"> <span><span>Everon</span></span></td><td style="width:476px;"> <span><span>Everon OCPP Backends</span></span></td><td style="width:159.094px;"> CVE-2026-20748<div></div></td><td style="width:98.3594px;"> <span><span>7.5</span></span></td><td style="width:99.9375px;"> <span><span>High</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span>0.102</span></span></td><td style="width:100.328px;"> <span><span> CWE-613</span></span></td></tr><tr><td style="width:174px;"> <span><span>Everon</span></span></td><td style="width:476px;"> <span><span>Everon OCPP Backends</span></span></td><td style="width:159.094px;"><div><div><span style="font-family:inherit;font-size:inherit;">CVE-2026-27027</span></div></div></td><td style="width:98.3594px;"> <span><span>6.5</span></span></td><td style="width:99.9375px;"> <span><span>Medium</span></span></td><td style="width:99.8125px;"> <span><span>0.000</span></span></td><td style="width:105.297px;"> <span><span>0.128</span></span></td><td style="width:100.328px;"><span><span> CWE-522</span></span> </td></tr><tr><td style="width:174px;"><span>Delta Electronics</span></td><td style="width:476px;"> <span>Delta Electronics CNCSoft-G2</span></td><td style="width:159.094px;"> <span>CVE-2026-3094</span></td><td style="width:98.3594px;"> 7.8</td><td style="width:99.9375px;">High</td><td style="width:99.8125px;" class="zp-selected-cell"> <span> 0.000</span></td><td style="width:105.297px;"> <span>0.029</span></td><td style="width:100.328px;"> <span>CWE-787</span></td></tr></tbody></table></div><p></p></div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br/></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br/>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de décembre 2025</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;">- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;<a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div></div><br/><p></p></div><p></p></div><p></p></div><p></p></div><p></p></div><p></p></div><p></p></div></div></div></div></div><div><div><div><div><p></p></div>
</div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 09 Mar 2026 09:55:59 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S9]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s9</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>CrowdStrike 2026 Global Threat Report : les cyberattaques sont de plus en plus rapides Le rapport 2026 de CrowdStrike montre qu’en 2025, les attaquants ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span></span></span></span></span><div><div><div><p style="margin-bottom:13.3333px;"></p><div><div><p style="font-weight:bold;margin-bottom:13.3333px;">CrowdStrike 2026 Global Threat Report : les cyberattaques sont de plus en plus rapides</p><div><p>Le rapport 2026 de CrowdStrike montre qu’en 2025, les attaquants sont devenus plus rapides, plus discrets et très assistés par l’IA. Le temps moyen entre l’accès initial et le mouvement latéral est tombé à 29 minutes, avec un record de 27 secondes. Les acteurs de la menace utilisent l’IA pour accélérer le phishing, l’ingénierie sociale et l’automatisation des attaques (+89% d’activité malveillante liée à l’IA). Ils ciblent aussi les systèmes d’IA d’entreprise via des injections malveillantes et l’exploitation de vulnérabilités. 82% des détections sont désormais sans malware : les attaquants abusent d’identifiants valides, de flux d’identité de confiance et d’intégrations SaaS légitimes. Les attaques supply chain, l’exploitation de zero-days (+42%) et la compromission d’équipements réseau (VPN, firewalls) marquent une forte hausse, notamment chez les acteurs liés à la Chine et à la Corée du Nord.</p></div><a href="https://www.crowdstrike.com/en-us/blog/crowdstrike-2026-global-threat-report-findings/" title="https://www.crowdstrike.com/en-us/blog/crowdstrike-2026-global-threat-report-findings/" rel="">https://www.crowdstrike.com/en-us/blog/crowdstrike-2026-global-threat-report-findings/</a><br/></div></div><p></p><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span><span><span><span><span><span><span>Rapport VulnCheck 2026 :&nbsp;<span>1 % des vulnérabilités divulguées ont été exploitées</span></span></span></span></span></span></span></span></span></p></div>
<div><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><p style="margin-bottom:13.3333px;">Le rapport revient sur les vulnérabilités qui ont été les plus utiles aux acteurs de la menace cyber. En 2025, à peine 1 % des vulnérabilités divulguées ont été exploitées sur 48 000 nouvelles CVEs. Il indique également que les POC pour les nouvelles CVE ont augmenté de 16,5 % en 2025, inondant les organisations de signaux « de risque » qui se sont souvent révélés être des fausses alertes ou des informations trompeuses générées par l'IA.</p><a href="https://wwv.vulncheck.com/2026-vulncheck-exploit-intelligence-report" title="https://wwv.vulncheck.com/2026-vulncheck-exploit-intelligence-report" rel="">https://wwv.vulncheck.com/2026-vulncheck-exploit-intelligence-report</a><br/><div><div><div><div><strong>Rapport sur les cybermenaces : la vulnérabilité croissante du secteur automobile</strong><br/></div><div>Dans ce rapport Upstream (société de cybersécurité), analyse l'évolution cyber-risques dans l'automobile et la mobilité intelligente, en mettant l'accent sur l'escalade des ransomwares qui ciblent les systèmes industriels (OT) et perturbent la production. Il souligne comment la convergence entre l'IT et l'OT, accélérée par l'intelligence artificielle et l'essor des véhicules définis par logiciel, élargit la surface d'attaque. Le document détaille ainsi la vulnérabilité globale des chaînes d'approvisionnement face à des attaques qui frappent désormais simultanément le cloud, les API et les systèmes physiques des véhicules.<br/></div><a href="https://info.upstream.auto/hubfs/Security_Report/Security_Report_2026/Upstream_2026_Global_Automotive_Cybersecurity_Report.pdf" title="https://info.upstream.auto/hubfs/Security_Report/Security_Report_2026/Upstream_2026_Global_Automoti…" rel="">https://info.upstream.auto/hubfs/Security_Report/Security_Report_2026/Upstream_2026_Global_Automoti…</a><br/></div></div>
</div><p></p><strong><p style="margin-bottom:13.3333px;line-height:2;"></p></strong><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnerability&nbsp;Corner :</span>&nbsp;</p></div></div><div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:179px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:146.641px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:227.391px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:761.609px;"><div><div><p><span>Liens&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:179px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20775" target="_blank" rel="noreferrer noopener"><span>CVE-2022-20775</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:146.641px;"><div><div><p><span>Cisco&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:227.391px;"><div><div><p><span>SD-WAN&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:761.609px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20775%2C%20https%3A//www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems%2C%20https%3A//www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems%2C%20https%3A//www.cisco.com/c/en/us/support/docs/csa/cisco-sa-sd-wan-priv-E6e8tEdF.html" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2022-20775, https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems, https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems, https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-sd-wan-priv-E6e8tEdF.html</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:179px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20127" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20127</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:146.641px;"><div><div><p><span>Cisco&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:227.391px;"><div><div><p><span>Catalyst SD-WAN Controller and Manager&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:761.609px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20127%2C%20https%3A//sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk%2C%20https%3A//www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems%2C%20https%3A//www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2026-20127, https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk, https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems, https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:179px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25108" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25108</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:146.641px;"><div><div><p><span>Soliton Systems K.K&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:227.391px;"><div><div><p><span>FileZen&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:761.609px;"><div><div><p><span></span><a href="https://jvn.jp/en/jp/JVN84622767/%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-25108" target="_blank" rel="noreferrer noopener"><span>https://jvn.jp/en/jp/JVN84622767/, https://nvd.nist.gov/vuln/detail/CVE-2026-25108</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>Critical&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>High&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>Medium&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>Low&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>Total&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>19&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>23&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>Vnet/IP Interface Package for CENTUM VP R6 (VP6C3300)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>6&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>Johnson Controls, Inc.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>Frick Controls Quantum HD&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>6&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>EV Energy&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>ev.energy&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>4&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>Gardyn&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>Home Kit Firmware&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>4&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>Mobility46&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>mobility46.se&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>4&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>Chargemap&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>chargemap.com&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>4&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>CloudCharge&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>cloudcharge.se&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>4&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>EV2GO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>ev2go.io&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>4&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>SWITCH EV&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>swtchenergy.com&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>4&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>InSAT&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>MasterSCADA&nbsp;BUK-TS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>2&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:182px;"><div><div><p><span>Pelco, Inc.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:609px;"><div><div><p><span>Sarix&nbsp;Professional IMP 3 Series&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131.141px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:97.2188px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:107.016px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:87.3281px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:105.125px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Score&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Severity&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EPSS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Percentile&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CWE&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21718" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21718</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>10.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/327.html" target="_blank" rel="noreferrer noopener"><span>CWE-327</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>InSAT&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MasterSCADA&nbsp;BUK-TS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21410" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21410</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.163%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>37.216%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/89.html" target="_blank" rel="noreferrer noopener"><span>CWE-89</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>InSAT&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MasterSCADA&nbsp;BUK-TS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22553" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22553</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.424%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>61.749%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Chargemap&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>chargemap.com&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25851" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25851</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>CloudCharge&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>cloudcharge.se&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20781" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20781</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EV2GO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ev2go.io&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24731" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24731</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EV Energy&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ev.energy&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27772" target="_blank" rel="noreferrer noopener"><span>CVE-2026-27772</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Mobility46&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>mobility46.se&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27028" target="_blank" rel="noreferrer noopener"><span>CVE-2026-27028</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SWITCH EV&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>swtchenergy.com&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27767" target="_blank" rel="noreferrer noopener"><span>CVE-2026-27767</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Gardyn&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Home Kit Firmware&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-1242" target="_blank" rel="noreferrer noopener"><span>CVE-2025-1242</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.028%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.746%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/798.html" target="_blank" rel="noreferrer noopener"><span>CWE-798</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Gardyn&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Home Kit Firmware&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-29631" target="_blank" rel="noreferrer noopener"><span>CVE-2025-29631</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.258%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>48.915%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Johnson Controls, Inc.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Frick Controls Quantum HD&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21654" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21654</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Johnson Controls, Inc.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Frick Controls Quantum HD&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21656" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21656</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/94.html" target="_blank" rel="noreferrer noopener"><span>CWE-94</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Johnson Controls, Inc.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Frick Controls Quantum HD&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21657" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21657</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/94.html" target="_blank" rel="noreferrer noopener"><span>CWE-94</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Johnson Controls, Inc.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Frick Controls Quantum HD&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21658" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21658</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/94.html" target="_blank" rel="noreferrer noopener"><span>CWE-94</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24663" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24663</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25085" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25085</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/394.html" target="_blank" rel="noreferrer noopener"><span>CWE-394</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Gardyn&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Home Kit Firmware&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-29628" target="_blank" rel="noreferrer noopener"><span>CVE-2025-29628</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.016%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.203%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/319.html" target="_blank" rel="noreferrer noopener"><span>CWE-319</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Gardyn&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Home Kit Firmware&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-29629" target="_blank" rel="noreferrer noopener"><span>CVE-2025-29629</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.029%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.068%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/1392.html" target="_blank" rel="noreferrer noopener"><span>CWE-1392</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20742" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20742</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20764" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20764</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20902" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20902</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20910" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20910</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21389" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21389</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23702" target="_blank" rel="noreferrer noopener"><span>CVE-2026-23702</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24452" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24452</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24517" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24517</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24689" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24689</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24695" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24695</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25037" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25037</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25105" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25105</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25109" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25109</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25111" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25111</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25195" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25195</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25196" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25196</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25721" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25721</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3037" target="_blank" rel="noreferrer noopener"><span>CVE-2026-3037</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener"><span>CWE-78</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Chargemap&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>chargemap.com&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20792" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20792</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/307.html" target="_blank" rel="noreferrer noopener"><span>CWE-307</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>CloudCharge&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>cloudcharge.se&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25114" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25114</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/307.html" target="_blank" rel="noreferrer noopener"><span>CWE-307</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EV2GO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ev2go.io&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25945" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25945</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/307.html" target="_blank" rel="noreferrer noopener"><span>CWE-307</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EV Energy&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ev.energy&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24445" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24445</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/307.html" target="_blank" rel="noreferrer noopener"><span>CWE-307</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Johnson Controls, Inc.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Frick Controls Quantum HD&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21659" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21659</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/23.html" target="_blank" rel="noreferrer noopener"><span>CWE-23</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Mobility46&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>mobility46.se&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-26305" target="_blank" rel="noreferrer noopener"><span>CVE-2026-26305</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/307.html" target="_blank" rel="noreferrer noopener"><span>CWE-307</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Pelco, Inc.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Sarix&nbsp;Professional IMP 3 Series&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1241" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1241</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/288.html" target="_blank" rel="noreferrer noopener"><span>CWE-288</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SWITCH EV&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>swtchenergy.com&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25113" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25113</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/307.html" target="_blank" rel="noreferrer noopener"><span>CWE-307</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Chargemap&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>chargemap.com&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25711" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25711</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/613.html" target="_blank" rel="noreferrer noopener"><span>CWE-613</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>CloudCharge&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>cloudcharge.se&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27652" target="_blank" rel="noreferrer noopener"><span>CVE-2026-27652</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/613.html" target="_blank" rel="noreferrer noopener"><span>CWE-613</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EV2GO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ev2go.io&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20895" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20895</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/613.html" target="_blank" rel="noreferrer noopener"><span>CWE-613</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EV Energy&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ev.energy&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-26290" target="_blank" rel="noreferrer noopener"><span>CVE-2026-26290</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/613.html" target="_blank" rel="noreferrer noopener"><span>CWE-613</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Mobility46&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>mobility46.se&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27647" target="_blank" rel="noreferrer noopener"><span>CVE-2026-27647</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/613.html" target="_blank" rel="noreferrer noopener"><span>CWE-613</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SWITCH EV&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>swtchenergy.com&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25778" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25778</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/613.html" target="_blank" rel="noreferrer noopener"><span>CWE-613</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Vnet/IP Interface Package for CENTUM VP R6 (VP6C3300)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-1924" target="_blank" rel="noreferrer noopener"><span>CVE-2025-1924</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.9&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.011%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.207%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/787.html" target="_blank" rel="noreferrer noopener"><span>CWE-787</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Chargemap&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>chargemap.com&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20791" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20791</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>CloudCharge&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>cloudcharge.se&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20733" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20733</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EV2GO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ev2go.io&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22890" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22890</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EV Energy&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ev.energy&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25774" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25774</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Mobility46&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>mobility46.se&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22878" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22878</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>SWITCH EV&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>swtchenergy.com&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27773" target="_blank" rel="noreferrer noopener"><span>CVE-2026-27773</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Johnson Controls, Inc.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Frick Controls Quantum HD&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21660" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21660</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/256.html" target="_blank" rel="noreferrer noopener"><span>CWE-256</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Vnet/IP Interface Package for CENTUM VP R6 (VP6C3300)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48019" target="_blank" rel="noreferrer noopener"><span>CVE-2025-48019</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.011%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.215%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/617.html" target="_blank" rel="noreferrer noopener"><span>CWE-617</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Vnet/IP Interface Package for CENTUM VP R6 (VP6C3300)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48020" target="_blank" rel="noreferrer noopener"><span>CVE-2025-48020</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.011%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.215%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/617.html" target="_blank" rel="noreferrer noopener"><span>CWE-617</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Vnet/IP Interface Package for CENTUM VP R6 (VP6C3300)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48021" target="_blank" rel="noreferrer noopener"><span>CVE-2025-48021</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.011%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.215%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/191.html" target="_blank" rel="noreferrer noopener"><span>CWE-191</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Vnet/IP Interface Package for CENTUM VP R6 (VP6C3300)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48022" target="_blank" rel="noreferrer noopener"><span>CVE-2025-48022</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.011%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.215%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/130.html" target="_blank" rel="noreferrer noopener"><span>CWE-130</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Vnet/IP Interface Package for CENTUM VP R6 (VP6C3300)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48023" target="_blank" rel="noreferrer noopener"><span>CVE-2025-48023</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.011%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.215%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/617.html" target="_blank" rel="noreferrer noopener"><span>CWE-617</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20797" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20797</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/121.html" target="_blank" rel="noreferrer noopener"><span>CWE-121</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Copeland&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>XWEB 300D PRO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22877" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22877</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.7&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/22.html" target="_blank" rel="noreferrer noopener"><span>CWE-22</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br/></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br/>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de décembre 2025</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5 mars&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;échanges&nbsp;de&nbsp;fichiers&nbsp;entre les zones&nbsp;industrielles&nbsp;et IT, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/7abb2065-6cf1-41bd-956a-9eaaf4655853%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div></div><p></p></div><p></p></div><p></p></div><p></p></div></div></div></div></div><div><div><div><div><p></p></div>
</div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 01 Mar 2026 19:02:37 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S8]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s8</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Rapport 2026 de Dragos sur la cybersécurité en environnement OT Dragos met en évidence dans son article que le nombre d’acteurs développant des capacit ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span></span></span></span></span><div><div><div><p style="margin-bottom:13.3333px;"></p><div><p style="font-weight:bold;margin-bottom:13.3333px;"><span style="font-weight:bold;">Rapport 2026 de Dragos sur la cybersécurité en environnement OT</span></p><div><p>Dragos met en évidence dans son article que le nombre d’acteurs développant des capacités spécifiques aux environnements industriels continue de croître. 3 nouveaux groupes visant spécifiquement les installations industrielles ont été identifiés. Également, le rapport met en avant le nouveau mode opératoire de ces groupes qui ne se contentent plus d'obtenir l'accès et d'attendre mais bien d'apprendre le fonctionnement des processus physiques afin de pouvoir les perturber.</p></div><a href="https://www.dragos.com/ot-cybersecurity-year-in-review" rel="">https://www.dragos.com/ot-cybersecurity-year-in-review</a></div><p></p><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span><span><span><span><span>Analyse des menaces OT/IoT au second semestre 2025 et stratégies de renforcement de la cybersécurité</span></span></span></span></span></span></p></div>
<div><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><p style="margin-bottom:13.3333px;">Ce rapport publié par Nozomi Networks analyse les tendances de cybersécurité OT et IoT au second semestre 2025, en identifiant les principales techniques d’attaque, les secteurs les plus ciblés et les acteurs de menace. Il dresse un état des lieux des vulnérabilités présentes dans les environnements industriels, souligne les risques liés aux réseaux sans fil et à l’activité des botnets IoT et met en avant l’évolution des malwares.</p><p style="margin-bottom:13.3333px;"><a href="https://fr.nozominetworks.com/ot-iot-cybersecurity-trends-insights-february-2026" title="https://fr.nozominetworks.com/ot-iot-cybersecurity-trends-insights-february-2026" rel="">https://fr.nozominetworks.com/ot-iot-cybersecurity-trends-insights-february-2026</a></p><div><div><strong>Cyberespionnage et sabotage : Les nouvelles menaces contre la base industrielle de la défense</strong><br/></div><div>Google souligne l'évolution des cybermenaces, qui ciblent l'industrie mondiale de la défense et de l'aérospatiale, notamment à travers les opérations d'espionnage d'acteurs étatiques (tels que la Russie, la Chine, la Corée du Nord et l'Iran). L'article montre la vulnérabilité croissante de la chaîne d'approvisionnement face à la cybercriminalité et à l'hacktivisme, tout en démontrant comment les attaquants contournent la sécurité en ciblant directement le personnel, les processus de recrutement et les périphériques non surveillés.<br/></div><div><div><a href="https://cloud.google.com/blog/topics/threat-intelligence/threats-to-defense-industrial-base" title="https://cloud.google.com/blog/topics/threat-intelligence/threats-to-defense-industrial-base" rel="">https://cloud.google.com/blog/topics/threat-intelligence/threats-to-defense-industrial-base</a><br/></div></div><div><div><p><strong>Méthodologie de l'agence européenne de cybersécurité (ENISA) pour les exercices de crise cyber</strong></p><p style="margin-bottom:13.3333px;">L'ENISA met à disposition une méthodologie pour planifier, réaliser et évaluer un exercice de crise cyber. Toutes les étapes sont détaillés dans la méthodologie avec des conseils pour les professionels. L'agence européenne, met également à disposition un ensemble de modèles et de documents permettant aux planificateurs d'organiser des exercices efficaces.</p><a href="https://www.enisa.europa.eu/publications/the-enisa-cybersecurity-exercise-methodology" rel="">https://www.enisa.europa.eu/publications/the-enisa-cybersecurity-exercise-methodology</a></div></div><div><div><p style="font-weight:bold;"><strong>Cybermenaces : un risque stratégique en forte hausse</strong></p><p>Le rapport explique que les cyberattaques font aujourd’hui partie des risques les plus sérieux, surtout dans les pays du G7. Les campagnes de désinformation et les attaques contre les infrastructures critiques inquiètent de plus en plus. Globalement, la cyber n’est plus un risque secondaire : elle est désormais vue comme une menace majeure dans un contexte de fortes tensions internationales.<br/></p><a href="https://securityconference.org/en/publications/munich-security-report/2026/munich-security-index-2026/" rel="">https://securityconference.org/en/publications/munich-security-report/2026/munich-security-index-2026/</a></div></div>
</div><p></p><strong><p style="margin-bottom:13.3333px;line-height:2;"></p></strong><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnerability&nbsp;Corner :</span>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:163px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.297px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:225.141px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:787.859px;"><div><div><p><span>Liens&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:163px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2008-0015" target="_blank" rel="noreferrer noopener"><span>CVE-2008-0015</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.297px;"><div><div><p><span>Microsoft&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:225.141px;"><div><div><p><span>Windows&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:787.859px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2008-0015%2C%20https%3A//web.archive.org/web/20110305211119/https%3A//www.microsoft.com/technet/security/bulletin/ms09-032.mspx" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2008-0015, https://web.archive.org/web/20110305211119/https://www.microsoft.com/technet/security/bulletin/ms09-032.mspx</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:163px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7796" target="_blank" rel="noreferrer noopener"><span>CVE-2020-7796</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.297px;"><div><div><p><span>Synacor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:225.141px;"><div><div><p><span>Zimbra Collaboration Suite&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:787.859px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7796%2C%20https%3A//wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2020-7796, https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:163px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22175" target="_blank" rel="noreferrer noopener"><span>CVE-2021-22175</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.297px;"><div><div><p><span>GitLab&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:225.141px;"><div><div><p><span>GitLab&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:787.859px;"><div><div><p><span></span><a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22175.json%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2021-22175" target="_blank" rel="noreferrer noopener"><span>https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22175.json, https://nvd.nist.gov/vuln/detail/CVE-2021-22175</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:163px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-7694" target="_blank" rel="noreferrer noopener"><span>CVE-2024-7694</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.297px;"><div><div><p><span>TeamT5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:225.141px;"><div><div><p><span>ThreatSonar&nbsp;Anti-Ransomware&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:787.859px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-7694%2C%20https%3A//teamt5.org/en/posts/vulnerability-notice-threat-sonar-anti-ransomware-20240715/%2C%20https%3A//www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2024-7694, https://teamt5.org/en/posts/vulnerability-notice-threat-sonar-anti-ransomware-20240715/, https://www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:163px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22769" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22769</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.297px;"><div><div><p><span>Dell&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:225.141px;"><div><div><p><span>RecoverPoint for Virtual Machines (RP4VMs)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:787.859px;"><div><div><p><span></span><a href="https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-22769%2C%20https%3A//www.dell.com/support/kbdoc/en-us/000426742/recoverpoint-for-vms-apply-the-remediation-script-for-dsa%2C%20https%3A//www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079" target="_blank" rel="noreferrer noopener"><span>https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day, https://nvd.nist.gov/vuln/detail/CVE-2026-22769, https://www.dell.com/support/kbdoc/en-us/000426742/recoverpoint-for-vms-apply-the-remediation-script-for-dsa, https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:163px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-2441" target="_blank" rel="noreferrer noopener"><span>CVE-2026-2441</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:118.297px;"><div><div><p><span>Google&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:225.141px;"><div><div><p><span>Chromium&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:787.859px;"><div><div><p><span></span><a href="https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-2441" target="_blank" rel="noreferrer noopener"><span>https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html, https://nvd.nist.gov/vuln/detail/CVE-2026-2441</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:265px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:552px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.2812px;"><div><div><p><span>Critical&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.688px;"><div><div><p><span>High&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:108.906px;"><div><div><p><span>Medium&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.0625px;"><div><div><p><span>Low&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:91.4062px;"><div><div><p><span>Total&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:265px;"><div><div><p><span>Jinan USR IOT Technology Limited (PUSR)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:552px;" class="zp-selected-cell"><div><div><p><span>USR-W610&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.2812px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.688px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:108.906px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.0625px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:91.4062px;"><div><div><p><span>4&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:265px;"><div><div><p><span>GE&nbsp;Vernova&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:552px;"><div><div><p><span>Enervista&nbsp;UR Setup&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.2812px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.688px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:108.906px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.0625px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:91.4062px;"><div><div><p><span>2&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:265px;"><div><div><p><span>EnOcean&nbsp;Edge Inc&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:552px;"><div><div><p><span>SmartServer&nbsp;IoT&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.2812px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.688px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:108.906px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.0625px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:91.4062px;"><div><div><p><span>2&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:265px;"><div><div><p><span>Welker&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:552px;"><div><div><p><span>OdorEyes&nbsp;EcoSystem&nbsp;Pulse Bypass System with XL4 Controller&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.2812px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.688px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:108.906px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.0625px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:91.4062px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:265px;"><div><div><p><span>Honeywell&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:552px;"><div><div><p><span>I-HIB2PI-UL 2MP IP&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.2812px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.688px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:108.906px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.0625px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:91.4062px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:265px;"><div><div><p><span>Delta Electronics&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:552px;"><div><div><p><span>ASDA-Soft&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.2812px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.688px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:108.906px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.0625px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:91.4062px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:265px;"><div><div><p><span>Valmet&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:552px;"><div><div><p><span>Valmet DNA Engineering Web Tools&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.2812px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:106.688px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:108.906px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:94.0625px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:91.4062px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Score&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Severity&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EPSS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Percentile&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CWE&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Honeywell&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>I-HIB2PI-UL 2MP IP&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1670" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1670</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.039%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>11.863%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Jinan USR IOT Technology Limited (PUSR)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>USR-W610&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25715" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25715</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/521.html" target="_blank" rel="noreferrer noopener"><span>CWE-521</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Valmet&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Valmet DNA Engineering Web Tools&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-15577" target="_blank" rel="noreferrer noopener"><span>CVE-2025-15577</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.049%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>15.352%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/22.html" target="_blank" rel="noreferrer noopener"><span>CWE-22</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Welker&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>OdorEyes&nbsp;EcoSystem&nbsp;Pulse Bypass System with XL4 Controller&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24790" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24790</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EnOcean&nbsp;Edge Inc&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SmartServer&nbsp;IoT&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20761" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20761</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/77.html" target="_blank" rel="noreferrer noopener"><span>CWE-77</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Delta Electronics&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ASDA-Soft&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1361" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1361</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.011%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.514%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/121.html" target="_blank" rel="noreferrer noopener"><span>CWE-121</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>GE&nbsp;Vernova&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Enervista&nbsp;UR Setup&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1762" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1762</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.031%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.943%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/427.html" target="_blank" rel="noreferrer noopener"><span>CWE-427</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Jinan USR IOT Technology Limited (PUSR)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>USR-W610&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24455" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24455</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/319.html" target="_blank" rel="noreferrer noopener"><span>CWE-319</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Jinan USR IOT Technology Limited (PUSR)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>USR-W610&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-26048" target="_blank" rel="noreferrer noopener"><span>CVE-2026-26048</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Jinan USR IOT Technology Limited (PUSR)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>USR-W610&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-26049" target="_blank" rel="noreferrer noopener"><span>CVE-2026-26049</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.7&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/522.html" target="_blank" rel="noreferrer noopener"><span>CWE-522</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EnOcean&nbsp;Edge Inc&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SmartServer&nbsp;IoT&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22885" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22885</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.7&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener"><span>CWE-125</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>GE&nbsp;Vernova&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Enervista&nbsp;UR Setup&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1763" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1763</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.017%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.674%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/35.html" target="_blank" rel="noreferrer noopener"><span>CWE-35</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br/></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br/>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de décembre 2025</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5 mars&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;échanges&nbsp;de&nbsp;fichiers&nbsp;entre les zones&nbsp;industrielles&nbsp;et IT, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/7abb2065-6cf1-41bd-956a-9eaaf4655853%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div></div><br/><p></p></div>
</div><br/><br/><p></p></div><p></p></div><p></p></div></div></div></div></div><div><div><div><div><p></p></div>
</div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 23 Feb 2026 08:16:00 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S7]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s7</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Menaces cyber contre le transport maritime canadien Ce rapport du Centre canadien pour la cybersécurité analyse les risques cyber visant le secteur du ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span></span></span></span></span><div><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span><span><span>Menaces cyber contre le transport maritime canadien</span></span></span></span></p></div><div><div style="line-height:2;"><div style="line-height:2;"><div style="line-height:2;"><p style="margin-bottom:13.3333px;">Ce rapport du Centre canadien pour la cybersécurité analyse les risques cyber visant le secteur du transport maritime, qui représente plus de 8,3 milliards $ du PIB et une part majeure des importations (24 %) et exportations (18 %) du Canada. La menace principale provient des cybercriminels, surtout via le ransomware, qui peuvent bloquer les opérations portuaires et perturber les chaînes d’approvisionnement. La digitalisation croissante des ports et des navires (capteurs, OT connectée, systèmes satellitaires) élargit fortement la surface d’attaque. Les systèmes de positionnement (GPS, AIS) sont vulnérables au brouillage et au spoofing, pouvant entraîner des risques de navigation. Les États (Chine, Russie, Iran) ciblent le secteur pour l’espionnage économique, le vol de données logistiques et de propriété intellectuelle.</p><p style="margin-bottom:13.3333px;"></p><div><p style="font-weight:bold;"><span style="font-weight:bold;">LOTP : la nouvelle menace invisible au cœur des usines</span></p><p>Cet article présente le concept de « Living Off The Plant » (LOTP), une technique utilisant les fonctions natives des automates pour s'infiltrer dans les réseaux industriels. L'auteur démontre comment détourner des commandes légitimes pour circuler entre des équipements isolés, franchissant ainsi des barrières réseaux physiques ou série. Cette méthode de mouvement latéral permet d'agir sans utiliser de logiciels malveillants externes. L'objectif est d'alerter sur la vulnérabilité des architectures de sécurité actuelles et de repenser la protection des infrastructures critiques.</p><p><a href="https://www.researchgate.net/publication/399059887_Industrial_Ouroboros_Deep_Lateral_Movement_via_Living_Off_the_Plant/fulltext/694caeea06a9ab54f84a6f1b/Industrial-Ouroboros-Deep-Lateral-Movement-via-Living-Off-the-Plant.pdf?_tp=eyJjb250ZXh0Ijp7ImZpcnN0UG" rel="">https://www.researchgate.net/publication/399059887_Industrial_Ouroboros_Deep_Lateral_Movement_via_Living_Off_the_Plant/fulltext/694caeea06a9ab54f84a6f1b/Industrial-Ouroboros-Deep-Lateral-Movement-via-Living-Off-the-Plant.pdf?_tp=eyJjb250ZXh0Ijp7ImZpcnN0UG</a></p></div><p></p><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Campagne menée par APT28 exploitant la CVE-2026-21509</span></p><p>Le groupe de hackers APT28 lié à l’intelligence russe a lancé une campagne pour infecter des organisations européennes, notamment des agences maritimes et des compagnies de transport. Ce rapport détaille une nouvelle méthode d’intrusion ciblée contre des infrastructures critiques exploitant une faille récemment révélée dans Microsoft Office (CVE-2026-21509) dans les 24 heures suivant sa divulgation publique.</p><p><a href="https://www.trellix.com/blogs/research/apt28-stealthy-campaign-leveraging-cve-2026-21509-cloud-c2/" title="https://www.trellix.com/blogs/research/apt28-stealthy-campaign-leveraging-cve-2026-21509-cloud-c2/" rel="">https://www.trellix.com/blogs/research/apt28-stealthy-campaign-leveraging-cve-2026-21509-cloud-c2/</a></p><p></p><div><p style="margin-bottom:13.3333px;"><strong>L'intégration native de Sysmon dans Windows</strong><strong><br/></strong></p><p style="margin-bottom:13.3333px;">L'article annonce l'intégration native de la fonctionnalité Sysmon dans Windows 11 et Windows Server 2025 pour simplifier la surveillance des menaces. Cette mise à jour supprime le besoin d'installations manuelles en automatisant la maintenance via Windows Update. Elle offre une visibilité sur les activités suspectes, comme le vol d'identifiants, tout en bénéficiant du support technique de Microsoft. Cette version autorise l'usage de fichiers de configuration personnalisés pour alimenter les outils d'analyse de sécurité. Enfin, Microsoft prévoit d'y intégrer prochainement des analyses basées sur l'intelligence artificielle.</p><div><a href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/native-sysmon-functionality-coming-to-windows/4468112%C2%A0" rel="">https://techcommunity.microsoft.com/blog/windows-itpro-blog/native-sysmon-functionality-coming-to-windows/4468112</a>&nbsp;</div></div><p></p><p style="margin-bottom:13.3333px;line-height:2;"></p><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnerability&nbsp;Corner :</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:144px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span>Liens&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43468" target="_blank" rel="noreferrer noopener"><span>CVE-2024-43468</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Microsoft&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Configuration Manager&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43468%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2024-43468" target="_blank" rel="noreferrer noopener"><span>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43468, https://nvd.nist.gov/vuln/detail/CVE-2024-43468</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-15556" target="_blank" rel="noreferrer noopener"><span>CVE-2025-15556</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Notepad++&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Notepad++&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://community.notepad-plus-plus.org/topic/27298/notepad-v8-8-9-vulnerability-fix%2C%20https%3A//notepad-plus-plus.org/news/clarification-security-incident/%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-15556" target="_blank" rel="noreferrer noopener"><span>https://community.notepad-plus-plus.org/topic/27298/notepad-v8-8-9-vulnerability-fix, https://notepad-plus-plus.org/news/clarification-security-incident/, https://nvd.nist.gov/vuln/detail/CVE-2025-15556</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40536" target="_blank" rel="noreferrer noopener"><span>CVE-2025-40536</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>SolarWinds&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Web Help Desk&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_2026-1_release_notes.htm%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-40536%2C%20https%3A//www.solarwinds.com/trust-center/security-advisories/CVE-2025-40536" target="_blank" rel="noreferrer noopener"><span>https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_2026-1_release_notes.htm, https://nvd.nist.gov/vuln/detail/CVE-2025-40536, https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-40536</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20700" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20700</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Apple&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Multiple Products&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20700%2C%20https%3A//support.apple.com/en-us/126346%2C%20https%3A//support.apple.com/en-us/126348%2C%20https%3A//support.apple.com/en-us/126351%2C%20https%3A//support.apple.com/en-us/126352%2C%20https%3A//support.apple.com/en-us/126353" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2026-20700, https://support.apple.com/en-us/126346, https://support.apple.com/en-us/126348, https://support.apple.com/en-us/126351, https://support.apple.com/en-us/126352, https://support.apple.com/en-us/126353</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21510" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21510</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Microsoft&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Windows&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-21510" target="_blank" rel="noreferrer noopener"><span>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510, https://nvd.nist.gov/vuln/detail/CVE-2026-21510</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21513" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21513</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Microsoft&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Windows&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://msrc.microsoft.com/update-guide/advisory/CVE-2026-21513%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-21513" target="_blank" rel="noreferrer noopener"><span>https://msrc.microsoft.com/update-guide/advisory/CVE-2026-21513, https://nvd.nist.gov/vuln/detail/CVE-2026-21513</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21514" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21514</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Microsoft&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Office&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-21514" target="_blank" rel="noreferrer noopener"><span>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514, https://nvd.nist.gov/vuln/detail/CVE-2026-21514</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21519" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21519</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Microsoft&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Windows&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-21519" target="_blank" rel="noreferrer noopener"><span>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519, https://nvd.nist.gov/vuln/detail/CVE-2026-21519</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21525" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21525</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Microsoft&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Windows&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21525%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-21525" target="_blank" rel="noreferrer noopener"><span>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21525, https://nvd.nist.gov/vuln/detail/CVE-2026-21525</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21533" target="_blank" rel="noreferrer noopener"><span>CVE-2026-21533</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.4px;"><div><div><p><span>Microsoft&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:209.288px;"><div><div><p><span>Windows&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:704.712px;"><div><div><p><span></span><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-21533" target="_blank" rel="noreferrer noopener"><span>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533, https://nvd.nist.gov/vuln/detail/CVE-2026-21533</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr style="height:54.15px;"><td style="vertical-align:top;width:167.2px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:597.8px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:104.425px;"><div><div><p><span>Critical&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:103.45px;"><div><div><p><span>High&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.875px;"><div><div><p><span>Medium&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:101.4px;"><div><div><p><span>Low&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.363px;"><div><div><p><span>Total&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:167.2px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:597.8px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:104.425px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:103.45px;"><div><div><p><span>4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.875px;"><div><div><p><span>5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:101.4px;"><div><div><p><span>5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.363px;"><div><div><p><span>14&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:167.2px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:597.8px;"><div><div><p><span>Desigo&nbsp;CC family V6,NX,Polarion V2404,SINEC&nbsp;NMS,Siveillance&nbsp;Video V2022 R3,Solid&nbsp;Edge&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:104.425px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:103.45px;"><div><div><p><span>8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.875px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:101.4px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.363px;"><div><div><p><span>9&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:167.2px;"><div><div><p><span>AVEVA&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:597.8px;"><div><div><p><span>PI Data Archive PI&nbsp;Server,PI&nbsp;to CONNECT Agent&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:104.425px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:103.45px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.875px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:101.4px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.363px;"><div><div><p><span>2&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:167.2px;"><div><div><p><span>ZLAN Information Technology Co.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:597.8px;"><div><div><p><span>ZLAN5143D&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:104.425px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:103.45px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.875px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:101.4px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.363px;"><div><div><p><span>2&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:167.2px;"><div><div><p><span>Airleader&nbsp;GmbH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:597.8px;"><div><div><p><span>Airleader&nbsp;Master&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:104.425px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:103.45px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.875px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:101.4px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.363px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:167.2px;"><div><div><p><span>ZOLL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:597.8px;"><div><div><p><span>ePCR&nbsp;IOS Mobile Application&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:104.425px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:103.45px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.875px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:101.4px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.363px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Score&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Severity&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EPSS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Percentile&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CWE&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Airleader&nbsp;GmbH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Airleader&nbsp;Master&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1358" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1358</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/434.html" target="_blank" rel="noreferrer noopener"><span>CWE-434</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>ZLAN Information Technology Co.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ZLAN5143D&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24789" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24789</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.067%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>20.700%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>ZLAN Information Technology Co.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ZLAN5143D&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25084" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25084</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.074%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>22.265%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Desigo&nbsp;CC family V6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38545" target="_blank" rel="noreferrer noopener"><span>CVE-2023-38545</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>26.250%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>96.176%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/122.html" target="_blank" rel="noreferrer noopener"><span>CWE-122</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66597" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66597</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.029%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.888%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/327.html" target="_blank" rel="noreferrer noopener"><span>CWE-327</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66600" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66600</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.044%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>13.256%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/358.html" target="_blank" rel="noreferrer noopener"><span>CWE-358</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Solid Edge&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40936" target="_blank" rel="noreferrer noopener"><span>CVE-2025-40936</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.020%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.747%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener"><span>CWE-125</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>NX&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22923" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22923</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.006%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.269%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/121.html" target="_blank" rel="noreferrer noopener"><span>CWE-121</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>NX&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22924" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22924</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener"><span>CWE-125</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>NX&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22925" target="_blank" rel="noreferrer noopener"><span>CVE-2026-22925</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener"><span>CWE-125</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SINEC NMS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25655" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25655</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.006%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.322%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/427.html" target="_blank" rel="noreferrer noopener"><span>CWE-427</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SINEC NMS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25656" target="_blank" rel="noreferrer noopener"><span>CVE-2026-25656</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.006%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.322%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/427.html" target="_blank" rel="noreferrer noopener"><span>CWE-427</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Polarion&nbsp;V2404&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40587" target="_blank" rel="noreferrer noopener"><span>CVE-2025-40587</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.016%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.935%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer noopener"><span>CWE-79</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>AVEVA&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>PI Data Archive PI Server&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1507" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1507</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.054%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>17.000%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/248.html" target="_blank" rel="noreferrer noopener"><span>CWE-248</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66608" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66608</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.061%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>18.874%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/29.html" target="_blank" rel="noreferrer noopener"><span>CWE-29</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66598" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66598</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.029%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.803%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/327.html" target="_blank" rel="noreferrer noopener"><span>CWE-327</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>AVEVA&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>PI to CONNECT Agent&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1495" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1495</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.015%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.518%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/532.html" target="_blank" rel="noreferrer noopener"><span>CWE-532</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66601" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66601</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.044%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>13.256%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/358.html" target="_blank" rel="noreferrer noopener"><span>CWE-358</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Siveillance&nbsp;Video V2022 R3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-0836" target="_blank" rel="noreferrer noopener"><span>CVE-2025-0836</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.044%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>13.176%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer noopener"><span>CWE-862</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>ZOLL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>ePCR&nbsp;IOS Mobile Application&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-12699" target="_blank" rel="noreferrer noopener"><span>CVE-2025-12699</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.011%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.338%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/538.html" target="_blank" rel="noreferrer noopener"><span>CWE-538</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66594" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66594</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.042%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>12.655%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/209.html" target="_blank" rel="noreferrer noopener"><span>CWE-209</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66595" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66595</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.019%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.353%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/352.html" target="_blank" rel="noreferrer noopener"><span>CWE-352</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66599" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66599</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.042%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>12.655%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/497.html" target="_blank" rel="noreferrer noopener"><span>CWE-497</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66602" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66602</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.041%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>12.217%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/291.html" target="_blank" rel="noreferrer noopener"><span>CWE-291</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66607" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66607</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.7&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.044%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>13.256%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/358.html" target="_blank" rel="noreferrer noopener"><span>CWE-358</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66606" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66606</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.047%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>14.428%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/86.html" target="_blank" rel="noreferrer noopener"><span>CWE-86</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66603" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66603</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.044%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>13.256%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/358.html" target="_blank" rel="noreferrer noopener"><span>CWE-358</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66604" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66604</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.029%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.888%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/319.html" target="_blank" rel="noreferrer noopener"><span>CWE-319</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Yokogawa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FAST/TOOLS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66605" target="_blank" rel="noreferrer noopener"><span>CVE-2025-66605</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.042%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>12.655%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/359.html" target="_blank" rel="noreferrer noopener"><span>CWE-359</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br/></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br/>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de décembre 2025</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5 mars&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;échanges&nbsp;de&nbsp;fichiers&nbsp;entre les zones&nbsp;industrielles&nbsp;et IT, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/7abb2065-6cf1-41bd-956a-9eaaf4655853%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div></div><br/><br/><p></p></div></div></div></div></div><div><div><div><div><p></p></div></div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 15 Feb 2026 15:27:39 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S6]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s6</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Des satellites espions russes ont potentiellement intercepté les communications de satellites européens clés Selon une enquête du Financial Times, des ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span></span></span></span></span><div><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span><span>Des satellites espions russes ont potentiellement intercepté les communications de satellites européens clés</span></span></span></p></div><div><div><p style="margin-bottom:13.3333px;">Selon une enquête du Financial Times, des satellites espions russes auraient été en mesure d’intercepter les communications de plusieurs satellites européens stratégiques. Les autorités s’inquiètent du fait que certaines données sensibles, notamment les commandes de contrôle, ne soient pas chiffrées, en raison de l’ancienneté de nombreux satellites dépourvus de capacités de chiffrement avancées.</p><a href="https://www.ft.com/content/cd08c49c-658e-49c9-9a15-234f2bfc2074?accessToken=zwAGSfx71WnQkdPNCMScZY5JydOaFSNPK_wgdA.MEYCIQCfIo-xwIzKl6Rj8Yc80moWlg3qppbpuQ3cJKlt-dXVhQIhAN2mzsy8lpLFcWLKAa3opFRv4qR8RFkTCyDpoEg31R9h&amp;sharetype=gift&amp;token=a601ce5f-4c3c-42f9-98e" rel="">https://www.ft.com/content/cd08c49c-658e-49c9-9a15-234f2bfc2074?accessToken=zwAGSfx71WnQkdPNCMScZY5JydOaFSNPK_wgdA.MEYCIQCfIo-xwIzKl6Rj8Yc80moWlg3qppbpuQ3cJKlt-dXVhQIhAN2mzsy8lpLFcWLKAa3opFRv4qR8RFkTCyDpoEg31R9h&amp;sharetype=gift&amp;token=a601ce5f-4c3c-42f9-98e</a><a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_26_105" title="https://ec.europa.eu/commission/presscorner/detail/en/ip_26_105" rel=""><br/></a></div></div></div><p style="margin-bottom:13.3333px;"><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"></span></p><div><div style="clear:both;overflow:visible;direction:ltr;"><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span><span><span>Menace Salt Typhoon sur les infrastructures 5G</span></span></span></span></p><p style="margin-bottom:13.3333px;"><span><span><span>Ce rapport, publié par Booz Allen et Palo Alto Networks, deux acteurs majeurs du conseil en cybersécurité et des technologies de défense des réseaux, explique que les infrastructures 5G sont devenues une cible stratégique pour des groupes APT étatiques comme Salt Typhoon, capables d’infiltrer les réseaux télécoms pour espionner et exfiltrer des données sensibles. Les attaques reposent sur des identifiants volés, des compromissions de la supply chain et des techniques furtives difficiles à détecter.</span></span></span></p><p style="margin-bottom:13.3333px;"><a href="https://www.boozallen.com/expertise/tech-ecosystem/5g-technology/hardening-5g-infrastructure-against-salt-typhoon.html" title="https://www.boozallen.com/expertise/tech-ecosystem/5g-technology/hardening-5g-infrastructure-against-salt-typhoon.html" rel="">https://www.boozallen.com/expertise/tech-ecosystem/5g-technology/hardening-5g-infrastructure-against-salt-typhoon.html</a></p><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Sécuriser l'OT : l'autre défi de la transition énergétique britannique</span><br/></span></p><p style="margin-bottom:13.3333px;">Cet article souligne l'urgence de sécuriser les technologies opérationnelles (OT) du secteur énergétique britannique face à sa transition vers un modèle décentralisé et renouvelable. Phil Tonkin (Field CTO at Dragos<i>), </i>explique que la multiplication des petites installations connectées et des systèmes de stockage par batterie accroît la surface d'attaque, rendant le réseau vulnérable à des pannes en cascade. Pour garantir la sécurité nationale, il préconise de dépasser la simple conformité réglementaire en investissant dans la visibilité des actifs, la segmentation des réseaux et la formation de personnel qualifié.<br/></p><p style="margin-bottom:13.3333px;"><a href="https://energy-oil-gas.com/news/ot-cybersecurity-issues-facing-the-uk-energy-industry/" title="https://energy-oil-gas.com/news/ot-cybersecurity-issues-facing-the-uk-energy-industry/" rel="">https://energy-oil-gas.com/news/ot-cybersecurity-issues-facing-the-uk-energy-industry/</a><br/></p><p style="margin-bottom:13.3333px;"><span><span><strong>Allemagne : Entrée en vigueur de la loi NIS-2 et renforcement des obligations cyber</strong></span></span><br/></p><p style="margin-bottom:13.3333px;"><span><span>La loi d'application NIS-2 en Allemagne modernise le cadre législatif cyber en élargissant la surveillance à 30 000 entreprises, incluant désormais les PME industrielles. Elle impose des obligations strictes de gestion des risques, un signalement des incidents sous 24 heures et une responsabilité directe des dirigeants. L'objectif est d'harmoniser la résilience opérationnelle du pays avec les standards européens d'ici avril 2026.<br/></span></span></p><p style="margin-bottom:13.3333px;"><a href="https://cyble.com/blog/nis-2-implementation-act-germany/" title="https://cyble.com/blog/nis-2-implementation-act-germany/" rel="">https://cyble.com/blog/nis-2-implementation-act-germany/</a><br/></p></div><div><p style="margin-bottom:13.3333px;line-height:1;"></p><div><p style="margin-bottom:13.3333px;"></p><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"></span></p></div></div></div></div><div><p style="margin-bottom:13.3333px;"></p><div><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnerability&nbsp;Corner :</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:206.2px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:211.387px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:300.613px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:573.15px;"><div><div><p><span>Liens&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:206.2px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19006" target="_blank" rel="noreferrer noopener"><span>CVE-2019-19006</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:211.387px;"><div><div><p><span>Sangoma&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:300.613px;"><div><div><p><span>FreePBX&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:573.15px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19006%2C%20https%3A//wiki.freepbx.org/display/FOP/2019-11-20%2BRemote%2BAdmin%2BAuthentication%2BBypass" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2019-19006, https://wiki.freepbx.org/display/FOP/2019-11-20%2BRemote%2BAdmin%2BAuthentication%2BBypass</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:206.2px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39935" target="_blank" rel="noreferrer noopener"><span>CVE-2021-39935</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:211.387px;"><div><div><p><span>GitLab&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:300.613px;"><div><div><p><span>Community and Enterprise Editions&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:573.15px;"><div><div><p><span></span><a href="https://about.gitlab.com/releases/2021/12/06/security-release-gitlab-14-5-2-released/%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2021-39935" target="_blank" rel="noreferrer noopener"><span>https://about.gitlab.com/releases/2021/12/06/security-release-gitlab-14-5-2-released/, https://nvd.nist.gov/vuln/detail/CVE-2021-39935</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:206.2px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11953" target="_blank" rel="noreferrer noopener"><span>CVE-2025-11953</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:211.387px;"><div><div><p><span>React Native Community&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:300.613px;"><div><div><p><span>CLI&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:573.15px;"><div><div><p><span></span><a href="https://github.com/react-native-community/cli/commit/15089907d1f1301b22c72d7f68846a2ef20df547%2C%20https%3A//github.com/react-native-community/cli/pull/2735%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-11953" target="_blank" rel="noreferrer noopener"><span>https://github.com/react-native-community/cli/commit/15089907d1f1301b22c72d7f68846a2ef20df547, https://github.com/react-native-community/cli/pull/2735, https://nvd.nist.gov/vuln/detail/CVE-2025-11953</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:206.2px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64328" target="_blank" rel="noreferrer noopener"><span>CVE-2025-64328</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:211.387px;"><div><div><p><span>Sangoma&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:300.613px;"><div><div><p><span>FreePBX&nbsp;&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:573.15px;"><div><div><p><span></span><a href="https://github.com/FreePBX/security-reporting/security/advisories/GHSA-vm9p-46mv-5xvw%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-64328" target="_blank" rel="noreferrer noopener"><span>https://github.com/FreePBX/security-reporting/security/advisories/GHSA-vm9p-46mv-5xvw, https://nvd.nist.gov/vuln/detail/CVE-2025-64328</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:206.2px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24423" target="_blank" rel="noreferrer noopener"><span>CVE-2026-24423</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:211.387px;"><div><div><p><span>SmarterTools&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:300.613px;"><div><div><p><span>SmarterMail&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:573.15px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24423%2C%20https%3A//www.cve.org/CVERecord?id=CVE-2026-24423%2C%20https%3A%2F%2Fwww.smartertools.com%2Fsmartermail%2Frelease-notes%2Fcurrent" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2026-24423, https://www.cve.org/CVERecord?id=CVE-2026-24423, https://www.smartertools.com/smartermail/release-notes/current</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Critical&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>High&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Medium&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Low&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Total&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Avation&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>Light Engine Pro&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Mitsubishi Electric&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>FREQSHIP-mini for Windows&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>RISS SRL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>MOMA Seismic Station&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Synectix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>LAN 232 TRIO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:82px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Score&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Severity&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EPSS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Percentile&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CWE&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Synectix&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LAN 232 TRIO&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1633" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1633</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>10.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.054%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>17.083%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Avation&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Light Engine Pro&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1341" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1341</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.016%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>2.895%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>RISS SRL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MOMA Seismic Station&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1632" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1632</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.133%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>33.272%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Mitsubishi Electric&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FREQSHIP-mini for Windows&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-10314" target="_blank" rel="noreferrer noopener"><span>CVE-2025-10314</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.009%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.682%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/276.html" target="_blank" rel="noreferrer noopener"><span>CWE-276</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br/></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br/>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de décembre 2025</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5 mars&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;échanges&nbsp;de&nbsp;fichiers&nbsp;entre les zones&nbsp;industrielles&nbsp;et IT, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/7abb2065-6cf1-41bd-956a-9eaaf4655853%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div></div><p></p></div></div></div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 08 Feb 2026 18:57:55 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S5]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s5</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>L’UE renforce sa résilience face aux cybermenaces La Commission européenne a présenté un nouveau paquet cybersécurité pour mieux protéger l’UE face aux ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span></span></span></span></span><div><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">L’UE renforce sa résilience face aux cybermenaces</span></p></div><div><p style="margin-bottom:13.3333px;"><span>La Commission européenne a présenté un nouveau paquet cybersécurité pour mieux protéger l’UE face aux cyberattaques visant les services essentiels et les institutions démocratiques. Il prévoit une révision du Cybersecurity Act afin de sécuriser les chaînes d’approvisionnement ICT, notamment face aux fournisseurs à risque hors UE. Le cadre européen de certification cybersécurité est simplifié pour garantir des produits “secure by design” tout en réduisant les coûts pour les entreprises. Des ajustements ciblés de la directive NIS2 visent à clarifier les obligations et alléger la charge de conformité pour près de 28 700 entreprises, dont de nombreuses PME. Enfin, le rôle de l’ENISA est renforcé pour améliorer la détection, la réponse aux incidents et le développement des compétences en cybersécurité en Europe.</span></p><a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_26_105" title="https://ec.europa.eu/commission/presscorner/detail/en/ip_26_105" rel="">https://ec.europa.eu/commission/presscorner/detail/en/ip_26_105</a><a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_26_105" title="https://ec.europa.eu/commission/presscorner/detail/en/ip_26_105" rel=""><br/></a></div></div><p style="margin-bottom:13.3333px;"><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"></span></p><div><div style="clear:both;overflow:visible;direction:ltr;"><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span><span>Transformation technologique et industrielle en 2026</span></span></span></p><p style="margin-bottom:13.3333px;"><span><span><span>L'article présente les changements technologiques majeurs prévus pour l'année 2026. Il cherche à démontrer que la sécurité informatique, la production industrielle et le travail humain doivent désormais s'adapter à l'intelligence artificielle. Cette transition illustré par des exemples de partenariats entre la Turquie et le Royaume-Uni, dont le but est de financer l'IA &quot;physique&quot; pour automatiser l'impression 3D industrielle. L'importance des infrastructures, comme la 5G, pour soutenir ces évolutions technologique est mis en avant. Enfin, l'article nous permet de comprendre comment les entreprises et les employés réagissent à ces transformations numériques.&nbsp;</span></span></span></p><p style="margin-bottom:13.3333px;"><a href="https://www.dailysabah.com/business/tech/iot-expansion-forcing-rethink-of-cybersecurity-architecture" title="https://www.dailysabah.com/business/tech/iot-expansion-forcing-rethink-of-cybersecurity-architecture" rel="">https://www.dailysabah.com/business/tech/iot-expansion-forcing-rethink-of-cybersecurity-architecture</a><br/></p><p style="margin-bottom:13.3333px;"><span><span style="font-weight:bold;"></span></span></p><p><strong>Cybersécurité OT-IT : naviguer dans la nouvelle frontière du risque</strong></p><p></p><p style="margin-bottom:13.3333px;"><span><span>La convergence entre les systèmes IT et OT entraîne une évolution de la surface d’attaque. Elle crée de nouvelles opportunités tout en introduisant des enjeux de cybersécurité. L’article identifie six domaines affectés par cette convergence, notamment l’évolution des menaces liée à l’usage de l’IA et la nécessité de mettre en œuvre des principes Zero Trust dans des environnements de plus en plus interconnectés.</span></span><br/></p><p style="margin-bottom:13.3333px;"><a href="https://www.forbes.com/sites/chuckbrooks/2026/01/27/otit-cybersecurity-navigating-the-new-frontier-of-risk/" title="https://www.forbes.com/sites/chuckbrooks/2026/01/27/otit-cybersecurity-navigating-the-new-frontier-of-risk/" rel="">https://www.forbes.com/sites/chuckbrooks/2026/01/27/otit-cybersecurity-navigating-the-new-frontier-of-risk/</a><br/></p></div><div><p style="margin-bottom:13.3333px;line-height:1;"></p><div><p style="margin-bottom:13.3333px;"></p><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span></span></span></p></div></div></div></div><div><p style="margin-bottom:13.3333px;"></p><div><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnerability&nbsp;Corner :</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div></div><p></p><table border="1"><tbody><tr><td style="vertical-align:top;width:195px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:132px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:123.844px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:834.156px;"><div><p><strong>Liens&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:195px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-14634" target="_blank" rel="noreferrer noopener">CVE-2018-14634</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132px;"><div><p>Linux&nbsp;</p></div></td><td style="vertical-align:top;width:123.844px;"><div><p>Kernal&nbsp;</p></div></td><td style="vertical-align:top;width:834.156px;"><div><p><a href="https://access.redhat.com/errata/RHSA-2018%3A3540%2C%20https%3A//git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/about/%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2018-14634%2C%20https%3A//www.cve.org/CVERecord?id=CVE-2018-14634%2C%20https%3A%2F%2Fwww.kernel.org%2F" target="_blank" rel="noreferrer noopener">https://access.redhat.com/errata/RHSA-2018:3540, https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/about/, https://nvd.nist.gov/vuln/detail/CVE-2018-14634, https://www.cve.org/CVERecord?id=CVE-2018-14634, https://www.kernel.org/</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:195px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-52691" target="_blank" rel="noreferrer noopener">CVE-2025-52691</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132px;"><div><p>SmarterTools&nbsp;</p></div></td><td style="vertical-align:top;width:123.844px;"><div><p>SmarterMail&nbsp;</p></div></td><td style="vertical-align:top;width:834.156px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-52691%2C%20https%3A//www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-124/%2C%20https%3A//www.smartertools.com/smartermail/release-notes/current" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2025-52691, https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-124/, https://www.smartertools.com/smartermail/release-notes/current</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:195px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1281" target="_blank" rel="noreferrer noopener">CVE-2026-1281</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132px;"><div><p>Ivanti&nbsp;</p></div></td><td style="vertical-align:top;width:123.844px;"><div><p>Endpoint Manager Mobile (EPMM)&nbsp;</p></div></td><td style="vertical-align:top;width:834.156px;"><div><p><a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-1281%2C%20https%3A//support.mobileiron.com/mi/vsp/AB1771634/ivanti-security-update-1761642-1.0.0L-5.noarch.rpm%2C%20https%3A//support.mobileiron.com/mi/vsp/AB1771634/ivanti-security-update-1761642-1.0.0S-5.noarch.rpm" target="_blank" rel="noreferrer noopener">https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340, https://nvd.nist.gov/vuln/detail/CVE-2026-1281, https://support.mobileiron.com/mi/vsp/AB1771634/ivanti-security-update-1761642-1.0.0L-5.noarch.rpm, https://support.mobileiron.com/mi/vsp/AB1771634/ivanti-security-update-1761642-1.0.0S-5.noarch.rpm</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:195px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23760" target="_blank" rel="noreferrer noopener">CVE-2026-23760</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132px;"><div><p>SmarterTools&nbsp;</p></div></td><td style="vertical-align:top;width:123.844px;"><div><p>SmarterMail&nbsp;</p></div></td><td style="vertical-align:top;width:834.156px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23760%2C%20https%3A//www.smartertools.com/smartermail/release-notes/current" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2026-23760, https://www.smartertools.com/smartermail/release-notes/current</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:195px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24061" target="_blank" rel="noreferrer noopener">CVE-2026-24061</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132px;"><div><p>GNU&nbsp;</p></div></td><td style="vertical-align:top;width:123.844px;"><div><p>InetUtils&nbsp;</p></div></td><td style="vertical-align:top;width:834.156px;"><div><p><a href="https://cgit.git.savannah.gnu.org/cgit/inetutils.git%2C%20https%3A//codeberg.org/inetutils/inetutils/commit/ccba9f748aa8d50a38d7748e2e60362edd6a32cc%2C%20https%3A//codeberg.org/inetutils/inetutils/commit/fd702c02497b2f398e739e3119bed0b23dd7aa7b%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-24061" target="_blank" rel="noreferrer noopener">https://cgit.git.savannah.gnu.org/cgit/inetutils.git, https://codeberg.org/inetutils/inetutils/commit/ccba9f748aa8d50a38d7748e2e60362edd6a32cc, https://codeberg.org/inetutils/inetutils/commit/fd702c02497b2f398e739e3119bed0b23dd7aa7b, https://nvd.nist.gov/vuln/detail/CVE-2026-24061</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:195px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24858" target="_blank" rel="noreferrer noopener">CVE-2026-24858</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132px;"><div><p>Fortinet&nbsp;</p></div></td><td style="vertical-align:top;width:123.844px;"><div><p>Multiple Products&nbsp;</p></div></td><td style="vertical-align:top;width:834.156px;"><div><p><a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-060%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-24858%2C%20https%3A//www.fortinet.com/blog/psirt-blogs/analysis-of-sso-abuse-on-fortios" target="_blank" rel="noreferrer noopener">https://fortiguard.fortinet.com/psirt/FG-IR-26-060, https://nvd.nist.gov/vuln/detail/CVE-2026-24858, https://www.fortinet.com/blog/psirt-blogs/analysis-of-sso-abuse-on-fortios</a>&nbsp;</p></div></td></tr></tbody></table><div><div><div style="margin-bottom:2px;"></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:200px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:627px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:86.9531px;"><div><p><strong>Critical&nbsp;</strong></p></div></td><td style="vertical-align:top;width:95.9844px;"><div><p><strong>High&nbsp;</strong></p></div></td><td style="vertical-align:top;width:105px;"><div><p><strong>Medium&nbsp;</strong></p></div></td><td style="vertical-align:top;width:103.938px;"><div><p><strong>Low&nbsp;</strong></p></div></td><td style="vertical-align:top;width:100.875px;"><div><p><strong>Total&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:200px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:627px;"><div><p>ArmorStart&nbsp;LT 290D,ControlLogix&nbsp;Redundancy Enhanced Module Catalog 1756-RM2 Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:86.9531px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:95.9844px;"><div><p>10&nbsp;</p></div></td><td style="vertical-align:top;width:105px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:103.938px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:100.875px;"><div><p>10&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:200px;"><div><p>iba&nbsp;Systems&nbsp;</p></div></td><td style="vertical-align:top;width:627px;"><div><p>ibaPDA&nbsp;</p></div></td><td style="vertical-align:top;width:86.9531px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:95.9844px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:105px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:103.938px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:100.875px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:200px;"><div><p>Johnson Controls&nbsp;</p></div></td><td style="vertical-align:top;width:627px;"><div><p>Metasys Application and Data Server (ADS)&nbsp;</p></div></td><td style="vertical-align:top;width:86.9531px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:95.9844px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:105px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:103.938px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:100.875px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:200px;"><div><p>KiloView&nbsp;</p></div></td><td style="vertical-align:top;width:627px;" class="zp-selected-cell"><div><p>Encoder Series E1 hardware Version 1.4&nbsp;</p></div></td><td style="vertical-align:top;width:86.9531px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:95.9844px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:105px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:103.938px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:100.875px;"><div><p>1&nbsp;</p></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p><p style="margin-bottom:13.3333px;">Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:191px;" class="zp-selected-cell"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:293px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:132.281px;"><div><p><strong>CVSSv3 Score&nbsp;</strong></p></div></td><td style="vertical-align:top;width:152.766px;"><div><p><strong>CVSSv3 Severity&nbsp;</strong></p></div></td><td style="vertical-align:top;width:137.5px;"><div><p><strong>EPSS&nbsp;</strong></p></div></td><td style="vertical-align:top;width:151.859px;"><div><p><strong>Percentile&nbsp;</strong></p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><strong>CWE&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Johnson Controls&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>Metasys Application and Data Server (ADS)&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-26385" target="_blank" rel="noreferrer noopener">CVE-2025-26385</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>10.0&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.599%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>68.871%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/77.html" target="_blank" rel="noreferrer noopener">CWE-77</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>iba&nbsp;Systems&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ibaPDA&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14988" target="_blank" rel="noreferrer noopener">CVE-2025-14988</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.041%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>12.252%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/732.html" target="_blank" rel="noreferrer noopener">CWE-732</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>KiloView&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>Encoder Series E1 hardware Version 1.4&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1453" target="_blank" rel="noreferrer noopener">CVE-2026-1453</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>9.8&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.071%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>21.754%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener">CWE-306</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ControlLogix Redundancy Enhanced Module Catalog 1756-RM2 Firmware&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14027" target="_blank" rel="noreferrer noopener">CVE-2025-14027</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.055%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>17.374%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/401.html" target="_blank" rel="noreferrer noopener">CWE-401</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ArmorStart&nbsp;LT 290D&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9278" target="_blank" rel="noreferrer noopener">CVE-2025-9278</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.055%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>17.374%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noreferrer noopener">CWE-400</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ArmorStart&nbsp;LT 290D&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9279" target="_blank" rel="noreferrer noopener">CVE-2025-9279</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.092%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>26.044%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noreferrer noopener">CWE-400</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ArmorStart&nbsp;LT 290D&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9280" target="_blank" rel="noreferrer noopener">CVE-2025-9280</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.055%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>17.374%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noreferrer noopener">CWE-400</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ArmorStart&nbsp;LT 290D&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9281" target="_blank" rel="noreferrer noopener">CVE-2025-9281</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.092%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>26.044%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noreferrer noopener">CWE-400</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ArmorStart&nbsp;LT 290D&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9282" target="_blank" rel="noreferrer noopener">CVE-2025-9282</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.092%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>26.044%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noreferrer noopener">CWE-400</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ArmorStart&nbsp;LT 290D&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9283" target="_blank" rel="noreferrer noopener">CVE-2025-9283</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.092%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>26.044%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noreferrer noopener">CWE-400</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ArmorStart&nbsp;LT 290D&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9464" target="_blank" rel="noreferrer noopener">CVE-2025-9464</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.055%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>17.374%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noreferrer noopener">CWE-400</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ArmorStart&nbsp;LT 290D&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9465" target="_blank" rel="noreferrer noopener">CVE-2025-9465</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.092%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>26.044%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noreferrer noopener">CWE-400</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:191px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:293px;"><div><p>ArmorStart&nbsp;LT 290D&nbsp;</p></div></td><td style="vertical-align:top;width:114.656px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9466" target="_blank" rel="noreferrer noopener">CVE-2025-9466</a>&nbsp;</p></div></td><td style="vertical-align:top;width:132.281px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:152.766px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:137.5px;"><div><p>0.092%&nbsp;</p></div></td><td style="vertical-align:top;width:151.859px;"><div><p>26.044%&nbsp;</p></div></td><td style="vertical-align:top;width:128.156px;"><div><p><a href="https://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noreferrer noopener">CWE-400</a>&nbsp;</p></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br/></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity</span><span><br/></span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" title="- Bilan des Known Exploited Vulnerabilities du mois de décembre 2025" target="_blank" rel="">-</a><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-d%C3%A9cembre-2025" title="- Bilan des Known Exploited Vulnerabilities du mois de décembre 2025" target="_blank" rel=""> Bilan des Known Exploited Vulnerabilities du mois de décembre 2025</a>&nbsp;</p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;février&nbsp;2026 :&nbsp;Construire&nbsp;le plan de protection de&nbsp;ses&nbsp;installations&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/ff70c30b-3a81-44d5-a118-8541407e5699%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5 mars&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;échanges&nbsp;de&nbsp;fichiers&nbsp;entre les zones&nbsp;industrielles&nbsp;et IT, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/7abb2065-6cf1-41bd-956a-9eaaf4655853%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div></div><p style="margin-bottom:13.3333px;"><br/></p></div><br/><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 01 Feb 2026 18:58:51 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S4]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s4</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Hausse alarmante des cyberattaques sur les systèmes industriels Cyble, une entreprise de cybersécurité spécialisée dans la cyber threat inteligence, so ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span></span></span></span></span><div><div><p style="margin-bottom:13.3333px;"><strong><span><span><span>Hausse alarmante des cyberattaques sur les systèmes industriels</span></span></span></strong></p></div><div><div><div><div><p style="margin-bottom:13.3333px;">Cyble, une entreprise de cybersécurité spécialisée dans la cyber threat inteligence, souligne dans son rapport une explosion des attaques visant les environnements ICS/OT et l’IA. Entre 2020 et 2025, les attaques par ransomware ont augmenté de +355 %, passant d’environ 1400 à près de 6500 incidents. En 2025, 57 nouveaux groupes de ransomware et 27 groupes d’extorsion sont apparus, avec plus de 350 nouvelles variantes identifiées. 2451 vulnérabilités ICS publiées par 152 fournisseurs en un an ont été analysées. Les interfaces HMI et SCADA restent les cibles principales, et l’Europe concentre la majorité des attaques hacktivistes. L’IA accélère les offensives (phishing industriel, malwares adaptatifs), rendant les attaques plus rapides et plus difficiles à détecter.</p><a href="https://cyble.com/resources/research-reports/annual-threat-landscape-report-2025/" title="https://cyble.com/resources/research-reports/annual-threat-landscape-report-2025/" rel="">https://cyble.com/resources/research-reports/annual-threat-landscape-report-2025/</a><br/></div></div></div></div></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnérabilités connues activement exploitées sur l'année 2025</span></p><p style="margin-bottom:13.3333px;"><span><span><span><span>Cet article présente des statistiques sur les vulnérabilités exploitées en 2025. Sur 884 vulnérabilités exploitées, près de 29 % ont été exploitées le jour même ou avant la publication de leur CVE, contre 23,6 % en 2024.</span></span></span></span></p><p style="margin-bottom:13.3333px;"><a href="https://www.vulncheck.com/blog/state-of-exploitation-2026" title="https://www.vulncheck.com/blog/state-of-exploitation-2026" rel="">https://www.vulncheck.com/blog/state-of-exploitation-2026</a><br/></p></div><div><p style="margin-bottom:13.3333px;line-height:1;"></p><div><div><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span></span></span></p></div></div></div></div></div></div></div><div><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnerability&nbsp;Corner :</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:144px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:146.25px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:204.188px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:711.812px;"><div><div><p><span>Liens&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-31125" target="_blank" rel="noreferrer noopener"><span>CVE-2025-31125</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:146.25px;"><div><div><p><span>Vite&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:204.188px;"><div><div><p><span>Vitejs&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:711.812px;"><div><div><p><span></span><a href="https://github.com/vitejs/vite/commit/59673137c45ac2bcfad1170d954347c1a17ab949%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-31125" target="_blank" rel="noreferrer noopener"><span>https://github.com/vitejs/vite/commit/59673137c45ac2bcfad1170d954347c1a17ab949, https://nvd.nist.gov/vuln/detail/CVE-2025-31125</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-34026" target="_blank" rel="noreferrer noopener"><span>CVE-2025-34026</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:146.25px;"><div><div><p><span>Versa&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:204.188px;"><div><div><p><span>Concerto&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:711.812px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-34026%2C%20https%3A//security-portal.versa-networks.com/emailbulletins/6830f94328defa375486ff2e" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2025-34026, https://security-portal.versa-networks.com/emailbulletins/6830f94328defa375486ff2e</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-54313" target="_blank" rel="noreferrer noopener"><span>CVE-2025-54313</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:146.25px;"><div><div><p><span>Prettier&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:204.188px;"><div><div><p><span>eslint-config-prettier&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:711.812px;"><div><div><p><span></span><a href="https://github.com/prettier/eslint-config-prettier/issues/339#issuecomment-3090304490%2C%20https://nvd.nist.gov/vuln/detail/CVE-2025-54313%2C%20https://www.npmjs.com/package/eslint-config-prettier?activeTab=versions" target="_blank" rel="noreferrer noopener"><span>https://github.com/prettier/eslint-config-prettier/issues/339#issuecomment-3090304490, https://nvd.nist.gov/vuln/detail/CVE-2025-54313, https://www.npmjs.com/package/eslint-config-prettier?activeTab=versions</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68645" target="_blank" rel="noreferrer noopener"><span>CVE-2025-68645</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:146.25px;"><div><div><p><span>Synacor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:204.188px;"><div><div><p><span>&nbsp;Zimbra Collaboration Suite (ZCS)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:711.812px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68645%2C%20https%3A//wiki.zimbra.com/wiki/Security_Center" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2025-68645, https://wiki.zimbra.com/wiki/Security_Center</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20045" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20045</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:146.25px;"><div><div><p><span>Cisco&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:204.188px;"><div><div><p><span>Unified Communications Manager&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:711.812px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20045%2C%20https%3A//sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b" target="_blank" rel="noreferrer noopener"><span>https://nvd.nist.gov/vuln/detail/CVE-2026-20045, https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:375px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:363px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:125.547px;" class="zp-selected-cell"><div><div><p><span>Critical&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:110.422px;"><div><div><p><span>High&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.938px;"><div><div><p><span>Medium&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131px;"><div><div><p><span>Low&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:91px;"><div><div><p><span>Total&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:375px;"><div><div><p><span>EVMAPA&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:363px;"><div><div><p><span>EVMAPA&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:125.547px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:110.422px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.938px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:91px;"><div><div><p><span>3&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:375px;"><div><div><p><span>Rockwell Automation&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:363px;"><div><div><p><span>CompactLogix&nbsp;5370,Verve&nbsp;Asset Manager&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:125.547px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:110.422px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.938px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:91px;"><div><div><p><span>3&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:375px;"><div><div><p><span>Weintek&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:363px;"><div><div><p><span>cMT3072XH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:125.547px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:110.422px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.938px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:91px;"><div><div><p><span>2&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:375px;"><div><div><p><span>AutomationDirect&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:363px;"><div><div><p><span>CLICK Programmable Logic Controller&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:125.547px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:110.422px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.938px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:91px;"><div><div><p><span>2&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:375px;"><div><div><p><span>Hubitat&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:363px;"><div><div><p><span>Elevation C3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:125.547px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:110.422px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.938px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:91px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:375px;"><div><div><p><span>Delta Electronics&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:363px;"><div><div><p><span>DIAView&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:125.547px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:110.422px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.938px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:91px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:375px;"><div><div><p><span>Johnson Controls Inc.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:363px;"><div><div><p><span>iSTAR Configuration Utility (ICU) tool&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:125.547px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:110.422px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:120.938px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:131px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:91px;"><div><div><p><span>1&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Score&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Severity&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EPSS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Percentile&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CWE&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EVMAPA&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EVMAPA&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-54816" target="_blank" rel="noreferrer noopener"><span>CVE-2025-54816</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/306.html" target="_blank" rel="noreferrer noopener"><span>CWE-306</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Hubitat&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Elevation C3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-1201" target="_blank" rel="noreferrer noopener"><span>CVE-2026-1201</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/639.html" target="_blank" rel="noreferrer noopener"><span>CWE-639</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Weintek&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>cMT3072XH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14750" target="_blank" rel="noreferrer noopener"><span>CVE-2025-14750</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/472.html" target="_blank" rel="noreferrer noopener"><span>CWE-472</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Weintek&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>cMT3072XH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14751" target="_blank" rel="noreferrer noopener"><span>CVE-2025-14751</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/620.html" target="_blank" rel="noreferrer noopener"><span>CWE-620</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Rockwell Automation&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Verve Asset Manager&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14377" target="_blank" rel="noreferrer noopener"><span>CVE-2025-14377</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.9&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.027%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.827%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/312.html" target="_blank" rel="noreferrer noopener"><span>CWE-312</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Delta Electronics&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>DIAView&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-0975" target="_blank" rel="noreferrer noopener"><span>CVE-2026-0975</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.052%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>16.310%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/77.html" target="_blank" rel="noreferrer noopener"><span>CWE-77</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EVMAPA&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EVMAPA&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-53968" target="_blank" rel="noreferrer noopener"><span>CVE-2025-53968</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/307.html" target="_blank" rel="noreferrer noopener"><span>CWE-307</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>EVMAPA&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EVMAPA&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-55705" target="_blank" rel="noreferrer noopener"><span>CVE-2025-55705</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/613.html" target="_blank" rel="noreferrer noopener"><span>CWE-613</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Rockwell Automation&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Verve Asset Manager&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14376" target="_blank" rel="noreferrer noopener"><span>CVE-2025-14376</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.013%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.619%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/922.html" target="_blank" rel="noreferrer noopener"><span>CWE-922</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Johnson Controls Inc.&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>iSTAR Configuration Utility (ICU) tool&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-26386" target="_blank" rel="noreferrer noopener"><span>CVE-2025-26386</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/121.html" target="_blank" rel="noreferrer noopener"><span>CWE-121</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Rockwell Automation&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CompactLogix 5370&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11743" target="_blank" rel="noreferrer noopener"><span>CVE-2025-11743</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.033%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.095%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/1284.html" target="_blank" rel="noreferrer noopener"><span>CWE-1284</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>AutomationDirect&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CLICK Programmable Logic Controller&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-25051" target="_blank" rel="noreferrer noopener"><span>CVE-2025-25051</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/256.html" target="_blank" rel="noreferrer noopener"><span>CWE-256</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>AutomationDirect&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CLICK Programmable Logic Controller&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67652" target="_blank" rel="noreferrer noopener"><span>CVE-2025-67652</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/261.html" target="_blank" rel="noreferrer noopener"><span>CWE-261</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br/></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br/>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-juin-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de juin 2025</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 8&nbsp;janvier&nbsp;2026 :&nbsp;Définir&nbsp;sa&nbsp;stratégie&nbsp;de&nbsp;détection&nbsp;en&nbsp;environnement&nbsp;industriel, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/591f0891-1fda-4029-9812-497ae82c48ff%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;février&nbsp;2026 :&nbsp;Construire&nbsp;le plan de protection de&nbsp;ses&nbsp;installations&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/ff70c30b-3a81-44d5-a118-8541407e5699%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5 mars&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;échanges&nbsp;de&nbsp;fichiers&nbsp;entre les zones&nbsp;industrielles&nbsp;et IT, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/7abb2065-6cf1-41bd-956a-9eaaf4655853%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div></div><br/><p></p></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 26 Jan 2026 07:57:54 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 26.S3]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-26.s3</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>1 000 systèmes touchés par un ransomware chez Romanian Waters Une attaque par ransomware a touché environ 1 000 systèmes de l’agence roumaine de gestio ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><span><span><span style="color:rgb(0, 0, 0);background-color:rgb(255, 255, 255);font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;font-weight:bold;"><span></span></span></span></span><div><div><p style="margin-bottom:13.3333px;"><strong><span><span>1 000 systèmes touchés par un ransomware chez Romanian Waters</span></span></strong></p></div><div><div><p style="margin-bottom:13.3333px;">Une attaque par ransomware a touché environ 1 000 systèmes de l’agence roumaine de gestion de l’eau (Romanian Waters), impactant serveurs (Systèmes d'informations géographiques, bases de données, messagerie, DNS) et postes Windows, avec une mise hors ligne du site web. Les données ont été chiffrées via BitLocker, sans lien établi avec un groupe de ransomware connu. L’attaque s’est propagée à 10 des 11 organismes de gestion de bassin du pays, mais les opérations hydrauliques n’ont pas été affectées, celles-ci étant maintenues localement par le personnel sur site.</p><a href="https://www.theregister.com/2025/12/22/around_1000_systems_compromised_in/" title="https://www.theregister.com/2025/12/22/around_1000_systems_compromised_in/" rel="">https://www.theregister.com/2025/12/22/around_1000_systems_compromised_in/</a><br/></div></div></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Volt Typhoon et le risque stratégique&nbsp;</span><span style="font-weight:bold;">pour les services publics d'électricité</span></p><p style="margin-bottom:13.3333px;"><span><span>Volt Typhoon est un groupe de menace avancée persistante (APT) qui cible principalement des organisations exploitant des infrastructures critiques, notamment dans le secteur de l’énergie, aux États-Unis. À la différence des attaques par ransomware visant une conséquence immédiate. La particularité de ce groupe est d'établir et de maintenir discrètement leurs accès, et d'atteindre des objectifs stratégiques lors d’événements critiques (conflits géopolitiques, phénomènes climatiques majeurs, etc.).</span></span></p></div><div><div><a href="https://static1.squarespace.com/static/5f80bdfaeeac37068ed8c60e/t/695a89bd127f927e3d166ad5/1767541184897/2026.01%2BAmpyx%2BCyber%2BExecutive%2BBrief%2BVolt%2BTyphoon%2Bv1.0.pdf" title="https://static1.squarespace.com/static/5f80bdfaeeac37068ed8c60e/t/695a89bd127f927e3d166ad5/1767541184897/2026.01+Ampyx+Cyber+Executive+Brief+Volt+Typhoon+v1.0.pdf " target="_blank" rel="noreferrer noopener">https://static1.squarespace.com/static/5f80bdfaeeac37068ed8c60e/t/695a89bd127f927e3d166ad5/1767541184897/2026.01+Ampyx+Cyber+Executive+Brief+Volt+Typhoon+v1.0.pdf</a></div></div></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span><span>Les 5 prédictions de 2026 sur la cybersécurité sur l'OT</span></span></span></p><p style="margin-bottom:13.3333px;"><span><span></span></span></p><p>L'ISA, association d'experts en automatisme, a publié cinq prévisions pour 2026. Deux prévisions méritent une attention particulière :</p><ul><li>Les attaquants utilisent l'IA pour automatiser la reconnaissance, identifier des mauvaises configurations et générer des exploits sans expertise particulière</li><li>Les agents IA peuvent interagir avec le système, exécuter des tâches, etc. Ces agents seront un nouveau vecteurs d'attaques à prendre en compte</li></ul><p></p><p style="margin-bottom:13.3333px;"><a href="https://www.automation.com/article/five-predictions-ot-operations-cybersecurity-2026" title="https://www.automation.com/article/five-predictions-ot-operations-cybersecurity-2026" rel="">https://www.automation.com/article/five-predictions-ot-operations-cybersecurity-2026</a><br/></p></div><div><p style="margin-bottom:13.3333px;line-height:1;"></p><div><div><p style="margin-bottom:13.3333px;"></p><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span></span></span></p></div></div></div></div></div></div></div><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnerability&nbsp;Corner :</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:144px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:140.25px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:136.688px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:788.312px;"><div><div><p><span>Liens&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-8110" target="_blank" rel="noreferrer noopener"><span>CVE-2025-8110</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:140.25px;"><div><div><p><span>Gogs&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:136.688px;"><div><div><p><span>Gogs&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:788.312px;"><div><div><p><span></span><a href="https://github.com/gogs/gogs/commit/553707f3fd5f68f47f531cfcff56aa3ec294c6f6%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-8110" target="_blank" rel="noreferrer noopener"><span>https://github.com/gogs/gogs/commit/553707f3fd5f68f47f531cfcff56aa3ec294c6f6, https://nvd.nist.gov/vuln/detail/CVE-2025-8110</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:144px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20805" target="_blank" rel="noreferrer noopener"><span>CVE-2026-20805</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:140.25px;"><div><div><p><span>Microsoft&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:136.688px;"><div><div><p><span>Windows&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:788.312px;"><div><div><p><span></span><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-20805%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2026-20805" target="_blank" rel="noreferrer noopener"><span>https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-20805, https://nvd.nist.gov/vuln/detail/CVE-2026-20805</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;"><span>Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span></span><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Source :&nbsp;ICS Advisory Project dashboard https://lookerstudio.google.com/u/0/reporting/f0d99ae7-c75b-4fdd-9951-8ecada5aee5e/page/G1klC&nbsp;&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:574.406px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.594px;"><div><div><p><span>Critical&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.562px;"><div><div><p><span>High&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:126.594px;"><div><div><p><span>Medium&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:109.984px;"><div><div><p><span>Low&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:150.891px;"><div><div><p><span>Total&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:574.406px;"><div><div><p><span>Industrial Edge Cloud Device (IECD),Industrial&nbsp;Edge Device Kit - arm64&nbsp;V1.10,RUGGEDCOM&nbsp;APE1808,SIMATIC&nbsp;ET 200AL IM 157-1 PN (6ES7157-1AB00-0AB0),TeleControl&nbsp;Server Basic&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.594px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.562px;"><div><div><p><span>4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:126.594px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:109.984px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:150.891px;"><div><div><p><span>8&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>AVEVA&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:574.406px;"><div><div><p><span>Process Optimization&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.594px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.562px;"><div><div><p><span>6&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:126.594px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:109.984px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:150.891px;"><div><div><p><span>7&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>YoSmart&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:574.406px;"><div><div><p><span>YoSmart&nbsp;server&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.594px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.562px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:126.594px;"><div><div><p><span>3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:109.984px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:150.891px;"><div><div><p><span>4&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Rockwell Automation&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:574.406px;"><div><div><p><span>432ES-IG3 Series&nbsp;A,FactoryTalk&nbsp;DataMosaix&nbsp;Private Cloud&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.594px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.562px;"><div><div><p><span>2&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:126.594px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:109.984px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:150.891px;"><div><div><p><span>2&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:82px;"><div><div><p><span>Schneider Electric&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:574.406px;"><div><div><p><span>EcoStruxure&nbsp;Power Build Rapsody software&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:148.594px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:123.562px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:126.594px;"><div><div><p><span>1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:109.984px;"><div><div><p><span>0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:150.891px;"><div><div><p><span>2&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</span></p></div><div><div style="margin-bottom:2px;"><table border="1"><tbody><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Vendor&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Product&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVE&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Score&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CVSSv3 Severity&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EPSS&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Percentile&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CWE&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>AVEVA&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Process Optimization&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61937" target="_blank" rel="noreferrer noopener"><span>CVE-2025-61937</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>10.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/94.html" target="_blank" rel="noreferrer noopener"><span>CWE-94</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Industrial Edge Cloud Device (IECD)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40805" target="_blank" rel="noreferrer noopener"><span>CVE-2025-40805</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>10.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.169%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>38.497%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/639.html" target="_blank" rel="noreferrer noopener"><span>CWE-639</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Industrial Edge Device Kit - arm64 V1.10&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40805" target="_blank" rel="noreferrer noopener"><span>CVE-2025-40805</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>10.0&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>CRITICAL&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.169%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>38.497%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/639.html" target="_blank" rel="noreferrer noopener"><span>CWE-639</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>RUGGEDCOM APE1808&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40892" target="_blank" rel="noreferrer noopener"><span>CVE-2025-40892</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.9&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.038%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>11.185%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer noopener"><span>CWE-79</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>AVEVA&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Process Optimization&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64691" target="_blank" rel="noreferrer noopener"><span>CVE-2025-64691</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/94.html" target="_blank" rel="noreferrer noopener"><span>CWE-94</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>AVEVA&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Process Optimization&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-65118" target="_blank" rel="noreferrer noopener"><span>CVE-2025-65118</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/427.html" target="_blank" rel="noreferrer noopener"><span>CWE-427</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Rockwell Automation&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>FactoryTalk&nbsp;DataMosaix&nbsp;Private Cloud&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-12807" target="_blank" rel="noreferrer noopener"><span>CVE-2025-12807</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.060%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>19.116%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/89.html" target="_blank" rel="noreferrer noopener"><span>CWE-89</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>TeleControl&nbsp;Server Basic&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40942" target="_blank" rel="noreferrer noopener"><span>CVE-2025-40942</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.013%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>1.595%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/250.html" target="_blank" rel="noreferrer noopener"><span>CWE-250</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>AVEVA&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Process Optimization&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61943" target="_blank" rel="noreferrer noopener"><span>CVE-2025-61943</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/89.html" target="_blank" rel="noreferrer noopener"><span>CWE-89</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>AVEVA&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Process Optimization&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64729" target="_blank" rel="noreferrer noopener"><span>CVE-2025-64729</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer noopener"><span>CWE-862</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>RUGGEDCOM APE1808&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40898" target="_blank" rel="noreferrer noopener"><span>CVE-2025-40898</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>8.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.067%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>21.105%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/22.html" target="_blank" rel="noreferrer noopener"><span>CWE-22</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Schneider Electric&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EcoStruxure&nbsp;Power Build Rapsody software&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13845" target="_blank" rel="noreferrer noopener"><span>CVE-2025-13845</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/416.html" target="_blank" rel="noreferrer noopener"><span>CWE-416</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Rockwell Automation&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>432ES-IG3 Series A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9368" target="_blank" rel="noreferrer noopener"><span>CVE-2025-9368</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.060%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>19.178%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/770.html" target="_blank" rel="noreferrer noopener"><span>CWE-770</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>SIMATIC ET 200AL IM 157-1 PN (6ES7157-1AB00-0AB0)&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40944" target="_blank" rel="noreferrer noopener"><span>CVE-2025-40944</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.040%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>12.021%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noreferrer noopener"><span>CWE-400</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>AVEVA&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Process Optimization&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-65117" target="_blank" rel="noreferrer noopener"><span>CVE-2025-65117</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.4&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/676.html" target="_blank" rel="noreferrer noopener"><span>CWE-676</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>AVEVA&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>Process Optimization&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64769" target="_blank" rel="noreferrer noopener"><span>CVE-2025-64769</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>7.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>HIGH&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/319.html" target="_blank" rel="noreferrer noopener"><span>CWE-319</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>RUGGEDCOM APE1808&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40893" target="_blank" rel="noreferrer noopener"><span>CVE-2025-40893</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.1&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.033%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>9.155%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer noopener"><span>CWE-79</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>YoSmart&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>YoSmart&nbsp;server&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59452" target="_blank" rel="noreferrer noopener"><span>CVE-2025-59452</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.8&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.043%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>13.249%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/340.html" target="_blank" rel="noreferrer noopener"><span>CWE-340</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Schneider Electric&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>EcoStruxure&nbsp;Power Build Rapsody software&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13844" target="_blank" rel="noreferrer noopener"><span>CVE-2025-13844</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>5.3&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>N/A&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/415.html" target="_blank" rel="noreferrer noopener"><span>CWE-415</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>YoSmart&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>YoSmart&nbsp;server&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59449" target="_blank" rel="noreferrer noopener"><span>CVE-2025-59449</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.9&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.040%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>11.883%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/863.html" target="_blank" rel="noreferrer noopener"><span>CWE-863</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>Siemens&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>RUGGEDCOM APE1808&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40891" target="_blank" rel="noreferrer noopener"><span>CVE-2025-40891</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.7&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.024%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>6.005%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer noopener"><span>CWE-79</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>YoSmart&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>YoSmart&nbsp;server&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59448" target="_blank" rel="noreferrer noopener"><span>CVE-2025-59448</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>4.7&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>MEDIUM&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.010%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.859%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/319.html" target="_blank" rel="noreferrer noopener"><span>CWE-319</span></a><span>&nbsp;</span></p></div></div></td></tr><tr><td style="vertical-align:top;width:72px;"><div><div><p><span>YoSmart&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>YoSmart&nbsp;server&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59451" target="_blank" rel="noreferrer noopener"><span>CVE-2025-59451</span></a><span>&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>3.5&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>LOW&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>0.040%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span>11.885%&nbsp;</span></p></div></div></td><td style="vertical-align:top;width:72px;"><div><div><p><span></span><a href="https://cwe.mitre.org/data/definitions/863.html" target="_blank" rel="noreferrer noopener"><span>CWE-863</span></a><span>&nbsp;</span></p></div></div></td></tr></tbody></table></div></div><div><p style="margin-bottom:13.3333px;"><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>-----&nbsp;<br/></span><span style="font-weight:bold;">Actualité Fortress Cybersecurity&nbsp;</span><span><span>&nbsp;</span><br/>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-juin-2025" target="_blank" rel="noreferrer noopener"><span>- Bilan des Known Exploited Vulnerabilities du mois de juin 2025</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener"><span>- Nouveau guide de classification des actifs industriels publié par l'ANSSI</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener"><span>Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 8&nbsp;janvier&nbsp;2026 :&nbsp;Définir&nbsp;sa&nbsp;stratégie&nbsp;de&nbsp;détection&nbsp;en&nbsp;environnement&nbsp;industriel, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/591f0891-1fda-4029-9812-497ae82c48ff%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;février&nbsp;2026 :&nbsp;Construire&nbsp;le plan de protection de&nbsp;ses&nbsp;installations&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/ff70c30b-3a81-44d5-a118-8541407e5699%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5 mars&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;échanges&nbsp;de&nbsp;fichiers&nbsp;entre les zones&nbsp;industrielles&nbsp;et IT, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/7abb2065-6cf1-41bd-956a-9eaaf4655853%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 9&nbsp;avril&nbsp;2026 :&nbsp;NIS 2 pour&nbsp;l’industrie​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 7&nbsp;mai&nbsp;2026 :&nbsp;Segmenter&nbsp;les réseaux&nbsp;industriels​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 4&nbsp;juin&nbsp;2026 :&nbsp;Gérer&nbsp;les incidents cyber&nbsp;en&nbsp;environnement&nbsp;industriel​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 2&nbsp;juillet&nbsp;2026 :&nbsp;Gérer&nbsp;les&nbsp;vulnérabilités&nbsp;en&nbsp;environnement&nbsp;industriel​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;septembre&nbsp;2026 :&nbsp;Mettre&nbsp;en&nbsp;place le plan de&nbsp;contrôle&nbsp;cyber de&nbsp;ses&nbsp;installations&nbsp;industriels​​, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 1&nbsp;octobre&nbsp;2026 :&nbsp;Sécuriser&nbsp;les&nbsp;accès&nbsp;à distance et de&nbsp;télémaintenance&nbsp;des&nbsp;actifs&nbsp;industriels, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 5&nbsp;novembre&nbsp;2026 :&nbsp;Protéger&nbsp;les endpoints dans les zones&nbsp;industrielles, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div><div><p style="margin-bottom:13.3333px;"><span>- 3&nbsp;décembre&nbsp;2026 :&nbsp;Protéger&nbsp;les réseaux mobiles&nbsp;privés&nbsp;5G, inscription&nbsp;</span><a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener"><span>lien</span></a><span>&nbsp;</span></p></div></div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 18 Jan 2026 20:54:25 +0100</pubDate></item><item><title><![CDATA[Bulletin cybersec indus hebdo 25.S51]]></title><link>https://www.fortress-cybersecurity.fr/blogs/post/bulletin-cybersec-indus-hebdo-25.s51</link><description><![CDATA[<img align="left" hspace="5" src="https://www.fortress-cybersecurity.fr/files/manufacturing.jpg"/>Une nouvelle liste des top 25 CWE de l'année 2025 Une mise à jour de la liste des faiblesses logicielles les plus dangereuses, le top 25 CWE 2025 (ver ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OIHw3lK1R0uMD1sBLIHwRg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1ydeJqOcTyiM7nuV2rOklQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_mz-pWBAHSAqarVeQFmIgeA"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M7cAp-bDTcCbA9gTt6JiPA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Les news relatives à la cybersécurité des installations industrielles</h2></div>
<div data-element-id="elm_sH2l7vQ8h3FUwPV13-l42A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div><div><div><div><strong><span>Une nouvelle liste des top 25 CWE de l'année 2025</span></strong></div>
<div><div style="display:inline;"></div><span>Une mise à jour de la liste des faiblesses logicielles les plus dangereuses, le top 25 CWE 2025 (version 4.19), a été publiée. Elle représente les 25 vulnérabilités parmi les 39080 CVE de cette année. Ce qui diffère par rapport à la liste de l'an dernier concerne le classement de chaque faiblesse. La &quot;CWE-79 : Improper Neutralization of Input During Web Page Generation (‘Cross Site Scripting’)&quot; conserve la première place depuis l'an dernier et la&nbsp; &quot;CWE-862: Missing Authorization&quot; est passée de la 5ème au 4ème rang. Cette liste a été établie à partir des CVE publiées entre le premier juin 2024 et le premier juin 2025, en utilisant une formule de notation qui permet de classer les vulnérabilités selon leur fréquence d'apparition et leur gravité mesurée par le CVSS.</span></div>
</div><a href="https://cwe.mitre.org/news/archives/news2025.html#december11_2025_CWE_Top_25_Now_Available">https://www.dragos.com/blog/dragos-industrial-ransomware-analysis-q3-2025#conclusion</a><div><div><strong></strong><strong><span>Internet Storm Center : Réduction de l'exposition des systèmes industriels et recul des protocoles obsolètes</span>&nbsp;</strong></div>
<div><span>L'Internet Storm Center note pour 2025 une baisse de 10% des systèmes de contrôle industriel (ICS) accessibles publiquement, bien que 100 000 restent exposés. Il est important de souligner que la majorité des systèmes détectés sont des ICS, mais que la majorité sont des &quot;honey pots&quot;. L'article relève également une diminution des serveurs web supportant les protocoles obsolètes SSLv2 et SSLv3. Bien que basées sur des données Shodan, ces observations soulignent une amélioration face aux vulnérabilités communes. L'auteur conclut que ces progrès, souvent éclipsés par l'actualité des cyberattaques, constituent une avancées réelles pour la sécurité globale.</span></div>
<div><a href="https://www.isa.org/getmedia/eaa7e025-c0fa-4cc0-81dd-75dc780bb0f0/Cloud-Computing-in-OT-Environments.pdf" target="_blank" rel="noreferrer noopener"></a><a href="https://isc.sans.edu/diary/Positive%20trends%20related%20to%20public%20IP%20ranges%20from%20the%20year%202025/32584">https://isc.sans.edu/diary/Positive%20trends%20related%20to%20public%20IP%20ranges%20from%20the%20year%202025/32584</a><br/></div><div><div><strong><span><span>Amazon alerte sur la menace du GRU : ciblage d'équipements mal configurés</span></span></strong></div>
<div><span><span><span>Amazon Threat Intelligence (AWS), expose une campagne du GRU (renseignement russe)&nbsp; ciblant les infrastructures critiques occidentales depuis 2021 via des équipements réseau mal configurés. Les attaquants interceptent le trafic pour voler et rejouer les identifiants, en délaissant l'exploitation de vulnérabilités logicielles pour réduire leur exposition. AWS a perturbé ces opérations en notifiant les clients touchés et en alertant les vendeurs concernés. AWS partage des indicateurs de compromission (IOC) soutenir la défense collective et indique la nécéssité de réaliser des audits pour prévenir ces intrusions.</span></span></span></div>
<div><div><div><a href="https://aws.amazon.com/fr/blogs/security/amazon-threat-intelligence-identifies-russian-cyber-threat-group-targeting-western-critical-infrastructure/">https://assets.sophos.com/X24WTUEQ/at/hxjx6q4p3h7xn6hsb3t46tjp/sophos-state-of-ransomware-in-manufacturing-2025.pdf&nbsp;&nbsp;</a></div></div>
<div><span><span style="font-weight:bold;"><span><span>MITRE étend D3FEND à la cybersécurité des systèmes industriels</span></span></span></span></div>
<div><div><span>MITRE a étendu son ontologie de cybersécurité D3FEND aux environnements industriels afin de mieux protéger les systèmes cyber-physiques utilisés dans les infrastructures critiques. Cette extension vise à répondre aux nouveaux risques liés à la connexion croissante des équipements OT aux réseaux et au cloud, alors qu’ils n’ont pas été conçus pour être exposés à Internet. D3FEND pour l’OT fournit un cadre structuré pour modéliser les actifs, les menaces et les contre-mesures spécifiques aux environnements industriels. L’objectif est d’aider les équipes OT et cyber à mieux comprendre les attaques, détecter les comportements malveillants et sécuriser les processus critiques.</span></div>
<div><div><a href="https://www.mitre.org/news-insights/news-release/mitre-extends-d3fend-ontology-operational-technology-cybersecurity">https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-343a?utm_source=https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-343a&amp;utm_medium=GovDelivery</a></div>
<div><span style="font-weight:bold;"><br/></span></div><div><span style="font-weight:bold;">Vulnerability&nbsp;Corner :</span>&nbsp;</div><div><div><div><p style="margin-bottom:13.3333px;">Liste&nbsp;des Known Exploited Vulnerabilities (KEV)&nbsp;publiés&nbsp;par&nbsp;l'agence&nbsp;de&nbsp;cybersécurité&nbsp;américaine CISA la&nbsp;semaine&nbsp;dernière&nbsp;:&nbsp;&nbsp;</p></div>
<div><div><div style="clear:both;overflow:visible;direction:ltr;"><div><p style="margin-bottom:13.3333px;"></p><div><table border="1"><tbody><tr><td style="vertical-align:top;width:189px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:136.125px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:228.734px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:759.266px;"><div><p><strong>Liens&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:189px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14611" target="_blank" rel="noreferrer noopener">CVE-2025-14611</a>&nbsp;</p></div></td><td style="vertical-align:top;width:136.125px;"><div><p>Gladinet&nbsp;</p></div></td><td style="vertical-align:top;width:228.734px;"><div><p>CentreStack&nbsp;and&nbsp;Triofox&nbsp;</p></div></td><td style="vertical-align:top;width:759.266px;"><div><p><a href="https://access.triofox.com/releases_history/%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-14611%2C%20https%3A//support.centrestack.com/hc/en-us/articles/360007159054-Hardening-the-CentreStack-Cluster#h_01JQRV57T37HJFQZKBZH9NBXQP%2C%20https://www.centrestack.com/p/gce_latest_release.html" target="_blank" rel="noreferrer noopener">https://access.triofox.com/releases_history/, https://nvd.nist.gov/vuln/detail/CVE-2025-14611, https://support.centrestack.com/hc/en-us/articles/360007159054-Hardening-the-CentreStack-Cluster#h_01JQRV57T37HJFQZKBZH9NBXQP, https://www.centrestack.com/p/gce_latest_release.html</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:189px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14733" target="_blank" rel="noreferrer noopener">CVE-2025-14733</a>&nbsp;</p></div></td><td style="vertical-align:top;width:136.125px;"><div><p>WatchGuard&nbsp;</p></div></td><td style="vertical-align:top;width:228.734px;"><div><p>Firebox&nbsp;</p></div></td><td style="vertical-align:top;width:759.266px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14733%2C%20https%3A//www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00027" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2025-14733, https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00027</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:189px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-20393" target="_blank" rel="noreferrer noopener">CVE-2025-20393</a>&nbsp;</p></div></td><td style="vertical-align:top;width:136.125px;"><div><p>Cisco&nbsp;</p></div></td><td style="vertical-align:top;width:228.734px;"><div><p>Multiple Products&nbsp;</p></div></td><td style="vertical-align:top;width:759.266px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-20393%2C%20https%3A//sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-attack-N9bf4" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2025-20393, https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-attack-N9bf4</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:189px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40602" target="_blank" rel="noreferrer noopener">CVE-2025-40602</a>&nbsp;</p></div></td><td style="vertical-align:top;width:136.125px;"><div><p>SonicWall&nbsp;</p></div></td><td style="vertical-align:top;width:228.734px;"><div><p>SMA1000 appliance&nbsp;</p></div></td><td style="vertical-align:top;width:759.266px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40602%2C%20https%3A//psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0019" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2025-40602, https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0019</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:189px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-43529" target="_blank" rel="noreferrer noopener">CVE-2025-43529</a>&nbsp;</p></div></td><td style="vertical-align:top;width:136.125px;"><div><p>Apple&nbsp;</p></div></td><td style="vertical-align:top;width:228.734px;"><div><p>Multiple Products&nbsp;</p></div></td><td style="vertical-align:top;width:759.266px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-43529%2C%20https%3A//support.apple.com/en-us/125884%2C%20https%3A//support.apple.com/en-us/125885%2C%20https%3A//support.apple.com/en-us/125886%2C%20https%3A//support.apple.com/en-us/125889%2C%20https%3A//support.apple.com/en-us/125892" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2025-43529, https://support.apple.com/en-us/125884, https://support.apple.com/en-us/125885, https://support.apple.com/en-us/125886, https://support.apple.com/en-us/125889, https://support.apple.com/en-us/125892</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:189px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59374" target="_blank" rel="noreferrer noopener">CVE-2025-59374</a>&nbsp;</p></div></td><td style="vertical-align:top;width:136.125px;"><div><p>ASUS&nbsp;</p></div></td><td style="vertical-align:top;width:228.734px;"><div><p>Live Update&nbsp;</p></div></td><td style="vertical-align:top;width:759.266px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59374%2C%20https%3A//www.asus.com/support/faq/1018727/" target="_blank" rel="noreferrer noopener">https://nvd.nist.gov/vuln/detail/CVE-2025-59374, https://www.asus.com/support/faq/1018727/</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:189px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59718" target="_blank" rel="noreferrer noopener">CVE-2025-59718</a>&nbsp;</p></div></td><td style="vertical-align:top;width:136.125px;"><div><p>Fortinet&nbsp;</p></div></td><td style="vertical-align:top;width:228.734px;"><div><p>Multiple Products&nbsp;</p></div></td><td style="vertical-align:top;width:759.266px;"><div><p><a href="https://docs.fortinet.com/upgrade-tool/fortigate%2C%20https%3A//fortiguard.fortinet.com/psirt/FG-IR-25-647%2C%20https%3A//nvd.nist.gov/vuln/detail/CVE-2025-59718" target="_blank" rel="noreferrer noopener">https://docs.fortinet.com/upgrade-tool/fortigate, https://fortiguard.fortinet.com/psirt/FG-IR-25-647, https://nvd.nist.gov/vuln/detail/CVE-2025-59718</a>&nbsp;</p></div></td></tr></tbody></table></div><br/><p></p></div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Vulnérabilités&nbsp;de&nbsp;composants&nbsp;de&nbsp;systèmes&nbsp;industriels&nbsp;:&nbsp;</span>&nbsp;</p></div>
<div><div><div><table border="1"><tbody><tr><td style="vertical-align:top;width:373px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:353px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:155.094px;"><div><p><strong>Critical&nbsp;</strong></p></div></td><td style="vertical-align:top;width:132.406px;"><div><p><strong>High&nbsp;</strong></p></div></td><td style="vertical-align:top;width:134.266px;"><div><p><strong>Medium&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Low&nbsp;</strong></p></div></td><td style="vertical-align:top;width:82px;"><div><p><strong>Total&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:373px;"><div><p>National Instruments&nbsp;</p></div></td><td style="vertical-align:top;width:353px;"><div><p>LabVIEW&nbsp;</p></div></td><td style="vertical-align:top;width:155.094px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:132.406px;"><div><p>9&nbsp;</p></div></td><td style="vertical-align:top;width:134.266px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>9&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:373px;"><div><p>Advantech&nbsp;</p></div></td><td style="vertical-align:top;width:353px;"><div><p>WebAccess/SCADA&nbsp;</p></div></td><td style="vertical-align:top;width:155.094px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:132.406px;"><div><p>2&nbsp;</p></div></td><td style="vertical-align:top;width:134.266px;"><div><p>3&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>5&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:373px;"><div><p>Johnson Controls Inc.&nbsp;</p></div></td><td style="vertical-align:top;width:353px;"><div><p>PowerG&nbsp;</p></div></td><td style="vertical-align:top;width:155.094px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:132.406px;"><div><p>3&nbsp;</p></div></td><td style="vertical-align:top;width:134.266px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>4&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:373px;"><div><p>Axis Communications&nbsp;</p></div></td><td style="vertical-align:top;width:353px;"><div><p>AXIS Camera Station Pro&nbsp;</p></div></td><td style="vertical-align:top;width:155.094px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:132.406px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:134.266px;"><div><p>3&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>4&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:373px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:353px;"><div><p>Micro820&nbsp;</p></div></td><td style="vertical-align:top;width:155.094px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:132.406px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:134.266px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>2&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:373px;"><div><p>Inductive Automation&nbsp;</p></div></td><td style="vertical-align:top;width:353px;"><div><p>Ignition&nbsp;</p></div></td><td style="vertical-align:top;width:155.094px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:132.406px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:134.266px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:373px;"><div><p>Hitachi Energy&nbsp;</p></div></td><td style="vertical-align:top;width:353px;"><div><p>AFS 660-B/C/S&nbsp;</p></div></td><td style="vertical-align:top;width:155.094px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:132.406px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:134.266px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:373px;"><div><p>Mitsubishi Electric&nbsp;</p></div></td><td style="vertical-align:top;width:353px;"><div><p>GT Designer3 Version1 (GOT2000)&nbsp;</p></div></td><td style="vertical-align:top;width:155.094px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:132.406px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:134.266px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:373px;"><div><p>Mitsubishi Electric&nbsp;Iconics&nbsp;Digital Solutions, Mitsubishi Electric&nbsp;</p></div></td><td style="vertical-align:top;width:353px;"><div><p>GENESIS64&nbsp;</p></div></td><td style="vertical-align:top;width:155.094px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:132.406px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:134.266px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:373px;"><div><p>Güralp&nbsp;Systems&nbsp;</p></div></td><td style="vertical-align:top;width:353px;"><div><p>Fortimus&nbsp;Series&nbsp;</p></div></td><td style="vertical-align:top;width:155.094px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:132.406px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:134.266px;"><div><p>1&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>0&nbsp;</p></div></td><td style="vertical-align:top;width:82px;"><div><p>1&nbsp;</p></div></td></tr></tbody></table></div><br/>Liste&nbsp;complète&nbsp;triée&nbsp;par CVSSv3&nbsp;Score :&nbsp;</div></div>
<div><p style="margin-bottom:13.3333px;"></p><div><div><table border="1"><tbody><tr><td style="vertical-align:top;width:342px;"><div><p><strong>Vendor&nbsp;</strong></p></div></td><td style="vertical-align:top;width:199px;"><div><p><strong>Product&nbsp;</strong></p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><strong>CVE&nbsp;</strong></p></div></td><td style="vertical-align:top;width:109.438px;"><div><p><strong>CVSSv3 Score&nbsp;</strong></p></div></td><td style="vertical-align:top;width:124.453px;"><div><p><strong>CVSSv3 Severity&nbsp;</strong></p></div></td><td style="vertical-align:top;width:125.438px;"><div><p><strong>EPSS&nbsp;</strong></p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p><strong>Percentile&nbsp;</strong></p></div></td><td style="vertical-align:top;width:104.844px;" class="zp-selected-cell"><div><p><strong>CWE&nbsp;</strong></p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Axis Communications&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>AXIS Camera Station Pro&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-30023" target="_blank" rel="noreferrer noopener">CVE-2025-30023</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>9.0&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>1.916%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>82.831%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/502.html" target="_blank" rel="noreferrer noopener">CWE-502</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Hitachi Energy&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>AFS 660-B/C/S&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3596" target="_blank" rel="noreferrer noopener">CVE-2024-3596</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>9.0&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>CRITICAL&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>19.021%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>95.115%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/924.html" target="_blank" rel="noreferrer noopener">CWE-924</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Advantech&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>WebAccess/SCADA&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14849" target="_blank" rel="noreferrer noopener">CVE-2025-14849</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>8.8&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.055%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>17.422%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/434.html" target="_blank" rel="noreferrer noopener">CWE-434</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Mitsubishi Electric&nbsp;Iconics&nbsp;Digital Solutions, Mitsubishi Electric&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>GENESIS64&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11774" target="_blank" rel="noreferrer noopener">CVE-2025-11774</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>8.2&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.032%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>8.694%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/78.html" target="_blank" rel="noreferrer noopener">CWE-78</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Advantech&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>WebAccess/SCADA&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14850" target="_blank" rel="noreferrer noopener">CVE-2025-14850</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>8.1&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.253%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>48.442%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/22.html" target="_blank" rel="noreferrer noopener">CWE-22</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>National Instruments&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>LabVIEW&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64461" target="_blank" rel="noreferrer noopener">CVE-2025-64461</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.015%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>2.350%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/787.html" target="_blank" rel="noreferrer noopener">CWE-787</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>National Instruments&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>LabVIEW&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64462" target="_blank" rel="noreferrer noopener">CVE-2025-64462</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.015%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>2.350%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener">CWE-125</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>National Instruments&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>LabVIEW&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64463" target="_blank" rel="noreferrer noopener">CVE-2025-64463</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.015%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>2.350%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener">CWE-125</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>National Instruments&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>LabVIEW&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64464" target="_blank" rel="noreferrer noopener">CVE-2025-64464</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.015%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>2.350%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener">CWE-125</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>National Instruments&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>LabVIEW&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64465" target="_blank" rel="noreferrer noopener">CVE-2025-64465</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.015%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>2.350%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener">CWE-125</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>National Instruments&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>LabVIEW&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64466" target="_blank" rel="noreferrer noopener">CVE-2025-64466</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.015%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>2.350%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener">CWE-125</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>National Instruments&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>LabVIEW&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64467" target="_blank" rel="noreferrer noopener">CVE-2025-64467</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.015%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>2.350%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noreferrer noopener">CWE-125</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>National Instruments&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>LabVIEW&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64468" target="_blank" rel="noreferrer noopener">CVE-2025-64468</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.015%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>2.350%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/416.html" target="_blank" rel="noreferrer noopener">CWE-416</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>National Instruments&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>LabVIEW&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-64469" target="_blank" rel="noreferrer noopener">CVE-2025-64469</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>7.8&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.015%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>2.350%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/121.html" target="_blank" rel="noreferrer noopener">CWE-121</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Johnson Controls Inc.&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>PowerG&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-26379" target="_blank" rel="noreferrer noopener">CVE-2025-26379</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>7.6&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/338.html" target="_blank" rel="noreferrer noopener">CWE-338</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Johnson Controls Inc.&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>PowerG&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61739" target="_blank" rel="noreferrer noopener">CVE-2025-61739</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>7.6&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/323.html" target="_blank" rel="noreferrer noopener">CWE-323</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Johnson Controls Inc.&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>PowerG&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61740" target="_blank" rel="noreferrer noopener">CVE-2025-61740</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>7.6&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/346.html" target="_blank" rel="noreferrer noopener">CWE-346</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>Micro820&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13824" target="_blank" rel="noreferrer noopener">CVE-2025-13824</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>7.5&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>HIGH&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.055%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>17.529%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/763.html" target="_blank" rel="noreferrer noopener">CWE-763</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Axis Communications&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>AXIS Camera Station Pro&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-30024" target="_blank" rel="noreferrer noopener">CVE-2025-30024</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>6.8&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.026%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>6.495%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/295.html" target="_blank" rel="noreferrer noopener">CWE-295</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Rockwell Automation&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>Micro820&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13823" target="_blank" rel="noreferrer noopener">CVE-2025-13823</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>6.5&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.020%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>4.555%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/1395.html" target="_blank" rel="noreferrer noopener">CWE-1395</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Inductive Automation&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>Ignition&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-13911" target="_blank" rel="noreferrer noopener">CVE-2025-13911</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>6.4&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.013%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>1.564%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/250.html" target="_blank" rel="noreferrer noopener">CWE-250</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Advantech&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>WebAccess/SCADA&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-46268" target="_blank" rel="noreferrer noopener">CVE-2025-46268</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>6.3&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.026%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>6.603%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/89.html" target="_blank" rel="noreferrer noopener">CWE-89</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Axis Communications&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>AXIS Camera Station Pro&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-30026" target="_blank" rel="noreferrer noopener">CVE-2025-30026</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>6.1&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.034%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>9.780%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/288.html" target="_blank" rel="noreferrer noopener">CWE-288</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Güralp&nbsp;Systems&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>Fortimus&nbsp;Series&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14466" target="_blank" rel="noreferrer noopener">CVE-2025-14466</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>5.3&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.091%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>26.321%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/770.html" target="_blank" rel="noreferrer noopener">CWE-770</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Johnson Controls Inc.&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>PowerG&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61738" target="_blank" rel="noreferrer noopener">CVE-2025-61738</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>5.3&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>N/A&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/319.html" target="_blank" rel="noreferrer noopener">CWE-319</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Axis Communications&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>AXIS Camera Station Pro&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-30025" target="_blank" rel="noreferrer noopener">CVE-2025-30025</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>5.2&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.037%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>10.628%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/502.html" target="_blank" rel="noreferrer noopener">CWE-502</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Mitsubishi Electric&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>GT Designer3 Version1 (GOT2000)&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11009" target="_blank" rel="noreferrer noopener">CVE-2025-11009</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>5.1&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.013%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>1.492%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/312.html" target="_blank" rel="noreferrer noopener">CWE-312</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Advantech&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>WebAccess/SCADA&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-14848" target="_blank" rel="noreferrer noopener">CVE-2025-14848</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>4.3&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.042%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>12.701%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/36.html" target="_blank" rel="noreferrer noopener">CWE-36</a>&nbsp;</p></div></td></tr><tr><td style="vertical-align:top;width:342px;"><div><p>Advantech&nbsp;</p></div></td><td style="vertical-align:top;width:199px;"><div><p>WebAccess/SCADA&nbsp;</p></div></td><td style="vertical-align:top;width:179.219px;"><div><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67653" target="_blank" rel="noreferrer noopener">CVE-2025-67653</a>&nbsp;</p></div></td><td style="vertical-align:top;width:109.438px;"><div><p>4.3&nbsp;</p></div></td><td style="vertical-align:top;width:124.453px;"><div><p>MEDIUM&nbsp;</p></div></td><td style="vertical-align:top;width:125.438px;"><div><p>0.042%&nbsp;</p></div></td><td style="vertical-align:top;width:94.1562px;"><div><p>12.701%&nbsp;</p></div></td><td style="vertical-align:top;width:104.844px;"><div><p><a href="https://cwe.mitre.org/data/definitions/22.html" target="_blank" rel="noreferrer noopener">CWE-22</a>&nbsp;</p></div></td></tr></tbody></table></div><br/></div><p></p></div></div><div style="clear:both;overflow:visible;direction:ltr;"><div><p style="margin-bottom:13.3333px;">-----&nbsp;</p><p style="margin-bottom:13.3333px;"><strong></strong></p><div><div><p style="margin-bottom:13.3333px;"><span style="font-weight:bold;">Actualité Fortress Cybersecurity </span>&nbsp;<br/></p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-juin-2025" target="_blank" rel="noreferrer noopener"></a><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-d-octobre-2025" target="_blank" rel="noreferrer noopener"></a></p></div>
</div></div></div></div><div><div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/bilan-des-known-exploited-vulnerabilities-du-mois-de-novembre-2025" target="_blank" rel="noreferrer noopener">- Bilan des Known Exploited Vulnerabilities du mois de novembre 2025</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/nouveau-guide-de-classification-des-actifs-industriels-publi%C3%A9-par-l-anssi" target="_blank" rel="noreferrer noopener">- Nouveau guide de classification des actifs industriels publié par l'ANSSI</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;"><a href="https://www.fortress-cybersecurity.fr/blogs/post/calendrier-2026-de-nos-webinaires-d%C3%A9di%C3%A9s-%C3%A0-la-cybers%C3%A9curit%C3%A9-des-installations-industrielles" target="_blank" rel="noreferrer noopener">Nos prochains webinaires dédiés à la cybersécurité des installations industrielles :</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 8 janvier 2026 : Définir sa stratégie de détection en environnement industriel, inscription <a href="https://events.teams.microsoft.com/event/591f0891-1fda-4029-9812-497ae82c48ff%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 6 février 2026 : Construire le plan de protection de ses installations industrielles, inscription <a href="https://events.teams.microsoft.com/event/ff70c30b-3a81-44d5-a118-8541407e5699%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 5 mars 2026 : Sécuriser les échanges de fichiers entre les zones industrielles et IT, inscription <a href="https://events.teams.microsoft.com/event/7abb2065-6cf1-41bd-956a-9eaaf4655853%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 9 avril 2026 : NIS 2 pour l’industrie​, inscription <a href="https://events.teams.microsoft.com/event/c8b15a81-411a-4256-868d-0585e07e2940%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 7 mai 2026 : Segmenter les réseaux industriels​, inscription <a href="https://events.teams.microsoft.com/event/da5eeb7d-f4e2-457b-8b8e-53107b4b553b%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 4 juin 2026 : Gérer les incidents cyber en environnement industriel​, inscription <a href="https://events.teams.microsoft.com/event/c5644e79-7926-4075-bc80-8de9ad9833cf%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 2 juillet 2026 : Gérer les vulnérabilités en environnement industriel​​, inscription <a href="https://events.teams.microsoft.com/event/e2cac6c8-9560-48d5-8736-25da3b084041%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 3 septembre 2026 : Mettre en place le plan de contrôle cyber de ses installations industriels​​, inscription <a href="https://events.teams.microsoft.com/event/1960fe77-9d3a-4f18-a7a9-70528a5e7151%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 1 octobre 2026 : Sécuriser les accès à distance et de télémaintenance des actifs industriels, inscription <a href="https://events.teams.microsoft.com/event/c9ba377e-5c27-4e4d-bffb-8ddc3a7856be%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 5 novembre 2026 : Protéger les endpoints dans les zones industrielles, inscription <a href="https://events.teams.microsoft.com/event/f079bb46-c1ad-4274-b0d3-e32db7d3b4fc%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
<div><p style="margin-bottom:13.3333px;">- 3 décembre 2026 : Protéger les réseaux mobiles privés 5G, inscription <a href="https://events.teams.microsoft.com/event/56995822-3f07-404d-b2dc-f6fb7727ad50%40a43cc6b0-e19e-4635-966f-1f00bc18b9ac" target="_blank" rel="noreferrer noopener">lien</a>&nbsp;</p></div>
</div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div></div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div></div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div><div><div><div><div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div></div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div></div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div><div><div><div><div><div><div><div style="clear:both;overflow:visible;direction:ltr;"><p style="margin-bottom:13.3333px;vertical-align:baseline;"><span style="line-height:20.7px;"></span></p></div>
</div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div></div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div><div><div><div></div><div style="clear:both;overflow:visible;direction:ltr;color:rgb(0, 0, 0);font-family:&quot;Segoe UI&quot;, &quot;Segoe UI Web&quot;, Arial, Verdana, sans-serif;font-size:12px;background-color:rgb(255, 255, 255);"><p style="margin-bottom:13.3333px;vertical-align:baseline;background-color:transparent;color:windowtext;"><span style="font-size:12pt;line-height:20.7px;font-family:Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"></span></p></div>
</div><p></p></div></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 21 Dec 2025 22:35:13 +0100</pubDate></item></channel></rss>