ICS Critical Patch Updates: June 2025 

Jun 19, 2025 | blog

Welcome to Foxguard’s ICS Critical Patch Updates June 2025, your go-to monthly resource for reviewing critical and high-severity vulnerabilities affecting Industrial Control Systems (ICS) and Operational Technology (OT) environments. 

Each month, leading ICS vendors—such as Siemens, Schneider Electric, ABB, Rockwell Automation, and Mitsubishi Electric—as well as CISA, release security advisories that affect industrial components. Foxguard examines these updates, highlights key risks, and summarizes vendor recommendations to help asset owners and operators stay informed, prioritize mitigation, and maintain resilience against emerging threats. 

The CVSS scores referenced in this blog are based on the versions provided by the respective vendors in their security advisories. While many advisories still predominantly use CVSS v3.1, an increasing number, particularly for newer vulnerabilities, are also providing CVSS v4.0 scores. We present the scores as published by the vendors to reflect the most relevant severity. 

Siemens 

Siemens has released multiple security advisories this month, many of which are classified as high and critical severity. Key vulnerabilities include: 

  • SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP GNU/Linux Subsystem Vulnerabilities Versions V3.1.0–< V3.1.5 (CVSS 8.8): Siemens has released new versions for the affected products and recommends to update to the latest versions. 

Version V3.1.5 (CVSS 8.7): Siemens is preparing fix versions and recommends countermeasures for products where fixes are not, or not yet available. 

Allows an authenticated attacker to alter secure boot and password configurations. Siemens has released new BIOS versions and is preparing further fixes, recommending countermeasures in the interim. 

Foxguard Insight:

Siemens’ June advisories continue a trend of critical exposure in foundational services (e.g., NTP, RADIUS, OPC UA) and device management layers. Many vulnerabilities have fixes available now. Organizations should quickly patch, especially where remote access or privilege defaults are involved. For components awaiting updates, deploy compensation controls and tighten access monitoring immediately. 

Schneider Electric 

Schneider issued one ICS-relevant advisory: 

Foxguard Insight:
Modicon controllers are frequently central to automation processes; vulnerabilities here can rapidly impact system integrity and availability. Apply updates now and consider network segmentation or disabling web interfaces until safeguards are validated. 

ABB 

Foxguard Insight:
These gateway devices often bridge building management and automation environments. A firmware update is critical to preserve trust boundaries and prevent unauthorized control. 

Rockwell Automation 

Foxguard Insight:
While not a direct vulnerability, accurate diagnostics are vital for safety. Upgrading ensures operators receive clear signals on device health and prevents potential mis-operations. 

CISA 

CISA published several ICS advisories this month, covering a broad range of vulnerabilities across vendors: 

Could allow remote code execution or data leakage. Users should update to firmware v22.0.1.  

No firmware fix is planned. Mitsubishi Electric recommends mitigation measures detailed here

May cause DoS. Patches have been released for impacted products, and users should upgrade to the latest versions. 

Unauthorized access to the web interface could allow attackers to manipulate vehicle functions. CISA recommends that device users take defensive measures to minimize the risk of these vulnerabilities being exploited. 

Vulnerabilities could be exploited to shut down essential subsystems, causing DoS. AVEVA advises evaluating the impact based on their operational environment, architecture, and product implementation. Users with affected product versions should apply security updates to mitigate the risk of exploitation.  

Could allow attackers to persist arbitrary code in the admin portal or cause a denial-of-service condition. AVEVA advises evaluating the impact based on their operational environment, architecture, and product implementation. Users with affected product versions should apply security updates to mitigate the risk of exploitation. 

A cross-site scripting vulnerability that could allow attackers to disable content security policy protections. AVEVA advises evaluating the impact based on their operational environment, architecture, and product implementation. Users with affected product versions should apply security updates to mitigate the risk of exploitation. 

Important CISA Update: As of May 12, 2025, CISA will no longer list cybersecurity updates or ICS advisories on its website. Future notifications will be shared via CISA’s social media platforms and email lists.Read the announcement here. 

Foxguard Insight:
CISA’s advisories show that ICS vulnerabilities now impact a wider range of devices, including networked peripherals like intercoms and GPS trackers. With some flaws lacking patches, strong defense-in-depth measures, such as segmentation, access controls, and monitoring, are critical. AVEVA’s PI system vulnerabilities also highlight the need to secure both front-end and admin interfaces to maintain operational integrity. 

Actionable Recommendations 

With several high and critical severity vulnerabilities identified this month, many affecting devices on the OT perimeter, asset owners should prioritize: 

  1. Applying available firmware and software updates: Especially for Siemens, ABB, and CyberData advisories rated CVSS 9.0 or higher. 
  1. Implement Vendor Recommendations: Follow all vendor-specific recommendations immediately where patches are unavailable (e.g., Mitsubishi MELSEC iQ-F Series). 
  1. Restricting access to management interfaces: Particularly on devices such as SinoTrack GPS receivers and RUGGEDCOM platforms to limit remote exploitability. 
  1. Reviewing and updating firewall and segmentation policies: Particularly for network edge devices and third-party vendor integrations. 
  1. Maintaining offline backups and validating restoration procedures: In case of operational disruption from unpatched vulnerabilities. 
  1. Implementing incident response plans: Ensuring they are clearly defined, regularly tested, and resilient enough to effectively mitigate cyber security incidents. 

How Foxguard Can Help  

Addressing ICS vulnerabilities can be overwhelming, but Foxguard offers tailored solutions to simplify security management and protect critical infrastructures.  

Our services include:  

  • FOXGUARD DISCOVER: Asset and network mapping solution for ICS and OT environments, providing real-time visibility of critical assets, detecting vulnerabilities, and offering actionable insights to enhance security posture.   
  • FOXGUARD CYBERWATCH: Asset and vulnerability management platform that monitors, manages, and remediates security risks across ICS and OT environments, ensuring compliance and reducing overall cyber risk.   
  • FOXGUARD PATCHINTEL: Patch intelligence service that provides patch availability reports to identify available security updates, and a secure supply chain to acquire and validate patch binaries for improved patch management and compliance.   
  • FOXGUARD DEPLOY: Patch distribution and deployment solution that securely applies validated patches across ICS and OT systems, ensuring timely and effective patch management to maintain security.    
  • FOXGUARD MANAGED SERVICES: Provides Patch Management as a Service (PMaaS) and Vulnerability Management as a Service (VMaaS) to continuously assess, prioritize, and address security risks in ICS and OT environments, helping maintain security compliance and operational integrity.  

Backed by years of expertise and trusted by numerous clients worldwide, Foxguard provides the essential tools and insights that empower critical infrastructure operators to stay ahead of emerging cyber risks.  

Stay Ahead of Threats  

ICS patching remains one of the most effective, but resource-intensive, defenses against cyber threats. With threat actors increasingly targeting industrial edge devices and engineering tools, it’s essential to act on vendor advisories quickly and strategically. 

Foxguard helps you stay ahead by making patch management repeatable, risk-informed, and aligned to your operations. If your organization requires support in managing ICS vulnerabilities, contact our team today

Your security is our priority. Stay vigilant and stay protected. 

Contact us

Contact our experts. We’ll do our best to get back to you within 24 hours.