ICS Critical Patch Updates: April 2025 

Apr 11, 2025 | blog

Welcome to the April edition of Foxguard’s ICS Critical Patch Updates, your go-to resource for critical vulnerabilities impacting Industrial Control Systems (ICS). 

This month brings several high-severity advisories that demand immediate action. Multiple vulnerabilities with CVSS scores of 9.0+ have been identified across major industrial automation vendors. Siemens, Schneider Electric, ABB, and Rockwell Automation have all issued patches to address vulnerabilities that could lead to remote code execution, denial of service, or even full system compromise. 

Below, we’ve summarized this month’s most critical updates and included actionable recommendations to help safeguard your operations. 

Siemens: Multiple High and Critical-Severity Vulnerabilities 

Siemens has released several security advisories covering vulnerabilities across a range of its products. Key updates include: 

  • SENTRON 7KT PAC1260 Data Manager (CVSS 10.0): Multiple vulnerabilities could allow attackers to compromise the device. Siemens advises replacing the device with the newer SENTRON 7KT PAC1261 and updating to the latest firmware version. 
  • Industrial Edge Device Kit (CVE-2024-54092 – CVSS 9.8): A weak authentication vulnerability could enable an unauthenticated remote attacker to impersonate a legitimate user. Siemens provides specific workarounds and mitigations. 
  • Insights Hub Private Cloud (CVSS 9.8): Vulnerabilities in the Kubernetes Ingress NGINX Controller could lead to arbitrary code execution, disclosure of secrets, or denial-of-service conditions. Siemens has released a new version and recommends updating. 
  • SIMATIC S7-1500 TM MFP V1.1 (CVSS 9.1): A related vulnerability affecting the same subsystem. Siemens is preparing fix versions and recommends countermeasures for affected products. 

FOXGUARD INSIGHT: 

Organizations should prioritize patching Siemens devices with CVSS ratings of 9.0 or higher. If patches aren’t immediately available, implement workarounds as recommended to minimize exposure. 

Schneider Electric: Critical Updates and End-of-Life Product Advisories 

Schneider Electric has issued several security advisories, covering both actively supported and end-of-life (EOL) products. Key highlights include: 

  • ConneXium Network Manager (CVE-2025-2222 – CVSS 8.2 and CVE-2025-2223 – CVSS 8.4): This product has reached end-of-life and is no longer supported. Vulnerabilities could lead to sensitive data disclosure, privilege escalation through man-in-the-middle attacks, denial of service, and remote code execution on engineering workstations. Mitigations are provided. 

FOXGUARD INSIGHT: 

EOL products pose significant security risks. Organizations relying on such devices should immediately apply mitigations and plan migrations to supported alternatives. 

ABB: Addressing High-Severity Vulnerabilities in Gateway Devices 

ABB has released two security advisories concerning vulnerabilities in specific gateway devices: 

  • M2M Gateway (CVSS up to 8.8): Flaws could result in arbitrary code execution or device inaccessibility. Mitigations are outlined in the advisory. 

FOXGUARD INSIGHT: 

Gateway devices are often vital points of communication within ICS environments, making their security paramount. Ensure firmware updates and vendor-recommended mitigations are applied promptly. 

Rockwell Automation: Critical Vulnerabilities in Arena® Software 

Rockwell Automation has disclosed multiple code execution vulnerabilities in Arena® software (CVSS 8.5): 

  • These vulnerabilities could allow attackers to disclose information and execute arbitrary code on the system. 
  • The vendor recommends updating to the latest version and applying security best practices if updating is not immediately possible. 

FOXGUARD INSIGHT: 

Quickly update Arena® software to the latest version and adhere to Rockwell’s security best practices to reduce risk. 

CISA Advisories: Highlighting Critical Vulnerabilities Across Multiple Vendors 

The Cybersecurity and Infrastructure Security Agency (CISA) has published several ICS security bulletins on vulnerabilities affecting multiple vendors, including: 

  • Hitachi Energy RTU500 Series (CVSS 8.7): Multiple vulnerabilities could allow an attacker to trigger a denial-of-service condition. Workarounds and mitigations are available. 
  • B&R APROL Products (CVSS 9.2): Affected by multiple high-severity vulnerabilities enabling command injection, privilege escalation, data exposure, and manipulation of product behavior. 

FOXGUARD INSIGHT: 

These CISA advisories reinforce the need for layered defenses across ICS environments. Prompt patching and adherence to remediation protocols are critical. 

Actionable Recommendations 

To mitigate risks and strengthen ICS security postures, organizations should: 

  • PRIORITIZE HIGH-SEVERITY PATCHES: Focus on addressing vulnerabilities with CVSS 9.0+ ratings, especially those in Siemens, ABB, and Rockwell Automation devices. 
  • ADDRESS EOL SYSTEMS: Review dependence on unsupported products like Schneider’s ConneXium. Implement vendor-suggested mitigations or migrate to supported platforms. 
  • ENFORCE STRONGER AUTHENTICATION CONTROLS: Use multi-factor authentication and continuously audit credentials to address weak authentication risks. 
  • SEGMENT AND MONITOR NETWORKS: Deploy network segmentation and intrusion detection systems (IDS) to limit access and monitor malicious activities. 
  • STAY UP-TO-DATE: Regularly monitor CISA bulletins and vendor advisories, applying patches or mitigations without delay. 

How Foxguard Can Help 

Addressing ICS vulnerabilities can be overwhelming, but Foxguard offers tailored solutions to simplify security management and protect critical infrastructures. 

Our services include: 

  • FOXGUARD DISCOVER: Asset and network mapping solution for ICS and OT environments, providing real-time visibility of critical assets, detecting vulnerabilities, and offering actionable insights to enhance security posture.  
  • FOXGUARD CYBERWATCH: Asset and vulnerability management platform that monitors, manages, and remediates security risks across ICS and OT environments, ensuring compliance and reducing overall cyber risk.  
  • FOXGUARD PATCHINTEL: Patch intelligence service that provides patch availability reports to identify available security updates, and a secure supply chain to acquire and validate patch binaries for improved patch management and compliance.  
  • FOXGUARD DEPLOY: Patch distribution and deployment solution that securely applies validated patches across ICS and OT systems, ensuring timely and effective patch management to maintain security.   
  • FOXGUARD MANAGED SERVICES: Provides Patch Management as a Service (PMaaS) and Vulnerability Management as a Service (VMaaS) to continuously assess, prioritize, and address security risks in ICS and OT environments, helping maintain security compliance and operational integrity. 

Backed by years of expertise and trusted by numerous clients worldwide, Foxguard provides the essential tools and insights that empower critical infrastructure operators to stay ahead of emerging cyber risks. 

Stay Ahead of Threats 

The April ICS security updates spotlight the urgency of proactive vulnerability management. With CVSS 10.0 vulnerabilities and threats targeting essential systems, it’s critical for organizations to act promptly. Review vendor advisories, deploy patches, and implement effective mitigations to maintain system integrity and resilience. 

If your organization requires support in managing ICS vulnerabilities, contact Foxguard today

Your security is our priority. Stay vigilant and stay protected. 

Contact us

Contact our experts. We’ll do our best to get back to you within 24 hours.