ICONICS GENESIS64, GENESIS32
Multiple vulnerabilities exist in ICONICS software products that allow remote code execution or denial of service. The vulnerabilities involve unsafe deserialization (CWE-502), buffer overflow (CWE-787), and code injection (CWE-94) in GENESIS64, GENESIS32, Hyper Historian, AnalytiX, BizViz, and MobileHMI. Exploitation requires only network access to the affected application; no authentication or user interaction is required. Successful exploitation could allow an attacker to execute arbitrary code, modify process data, alter historical records, or prevent operators from accessing the system.
- Network access to the vulnerable ICONICS application port
- Application running an affected version
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/7f47e399-2ef4-42e9-ad69-f3716af5abdcGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.