The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released five new ICS advisories this week, drawing attention to severe vulnerabilities affecting industrial and medical systems worldwide. Among the most notable disclosures are flaws in Siemens SiPass, Consilium’s CS5000 Fire Panel, Instantel Micromate, and others.
CISA’s advisories, released under alert codes ICSA-25-148-01 through ICSA-25-148-04, along with ICSMA-25-148-01, include vulnerability scores, mitigation strategies, and analysis of potential exploitation. Organizations across the manufacturing, healthcare, transportation, and energy sectors are urged to review these findings promptly.
Among the high-profile advisories is a serious vulnerability in Siemens SiPass, a widely used access control system in critical manufacturing environments.
This flaw could allow an attacker to install malicious firmware on affected devices. If exploited remotely or via a man-in-the-middle attack, a bad actor could compromise system integrity without needing physical access.
All versions of SiPass integrated AC5102 (ACC-G2) and ACC-AP are affected. Siemens has not issued a fix yet but recommends enabling TLS encryption to protect firmware transfers. The company also stresses the importance of operating devices in secure IT environments, following Siemens’ industrial security guidelines.
Another ICS advisory was issued for Siemens SiPass Integrated, specifically addressing a remote denial-of-service vulnerability.
This issue affects versions prior to V2.95.3.18 and could allow an unauthenticated attacker to crash the application by sending malformed packets. Airbus Security first reported the vulnerability, and Siemens recommends updating to version V2.95.3.18 or newer to mitigate the issue.
CISA also reported two critical vulnerabilities in the Consilium CS5000 Fire Panel, which is used in commercial, energy, healthcare, and transportation facilities.
The CS5000 contains a default SSH-enabled account with elevated permissions and a hard-coded VNC password visible within the binary itself. These backdoors allow attackers to remotely control or disable the fire panel.
Reported by Andrew Tierney of Pen Test Partners, these vulnerabilities currently have no fixes. Users are urged to upgrade to post-July 2024 fire panels or implement compensating controls like strict physical access.
Used in vibration monitoring across critical manufacturing, Micromate devices by Instantel are vulnerable due to a lack of authentication on a configuration port.
An attacker could remotely send commands to the device without any credentials. Instantel is working on a firmware update and advises users to restrict IP access and monitor device exposure in the meantime.
In the healthcare domain, Sante DICOM Viewer Pro, a diagnostic imaging tool, contains a memory corruption flaw.
Researcher Michael Heinzl reported that if a local attacker successfully exploits this vulnerability, it could lead to information disclosure or arbitrary code execution. Santesoft has released an updated version (v14.2.2) to address the issue.
CISA recommends the following proactive security measures to reduce risk and improve resilience across industrial and healthcare environments:
The latest ICS advisories reinforce a sobering reality: vulnerabilities in control systems like Siemens SiPass, Consilium’s fire panels, and Instantel’s monitoring tools could lead to business disruption and financial loss. As attackers continue to exploit weak spots in critical infrastructure, the need for smarter, faster vulnerability management is more urgent than ever.
Cyble empowers organizations with advanced, AI-driven intelligence to mitigate zero-day threats, prioritize patching based on real-world risk, and protect both IT and ICS environments. By combining vulnerability data, dark web insights, exploit intelligence, and asset context into a unified platform, Cyble helps security teams act faster, reduce attack surfaces, and prevent breaches before they occur.
See Cyble in action — request a DEMO today.
Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.