Okay, here’s a rewritten version of the article, suitable for a blog post, focusing on clarity and readability, and making some assumptions where “National CERT” is referred to ambiguously:
**NCERT Warns of Critical Security Flaws in Industry Grade Systems**
The National Computer Emergency Response Team (NCERT) has issued a critical alert about two severe vulnerabilities found in mySCADA myPRO, a widely used Supervisory Control and Data Acquisition (SCADA) system. These flaws could allow attackers to take complete control of industrial systems, leading to potentially catastrophic consequences.
The vulnerabilities, tracked as CVE-2025-20014 and CVE-2025-20061, have both received a dangerously high severity rating of 9.3 (out of 10) on the CVSS v4 scale. This rating highlights the extreme risk they pose.
**The Danger Involved**
The core problem lies in how mySCADA myPRO handles user input. Attackers can exploit this weakness by sending specially crafted POST requests (a type of data submission commonly used on the web) containing malicious commands. Successful exploitation could grant attackers:
* **Remote Code Execution (RCE):** The ability to run any code they want on the vulnerable system.
* **Unauthorized Administrative Access:** Full control over the SCADA system.
* **Operational Disruptions:** The power to shut down or disrupt critical industrial processes.
* **Data Breaches:** Access to sensitive data managed by the SCADA system.
* **Severe Safety Hazards:** The potential to manipulate physical equipment, creating dangerous situations.
Organizations using mySCADA myPRO are strongly urged to take immediate action to protect themselves.
**The Systems Affected**
The following versions of mySCADA myPRO are vulnerable:
* mySCADA PRO Manager v1.2 and earlier
* mySCADA PRO Runtime v9.2.0 and earlier
Systems running older, unpatched versions are at the greatest risk, especially if they are directly accessible from regular IT networks or the public internet. NCERT emphasizes that systems without proper network segmentation (isolating the SCADA system from other networks) are far more susceptible to attack.
**What to Do: Protecting Your Systems**
NCERT strongly recommends the following steps to mitigate the risks:
1. **Isolate Your SCADA System:** Severely restrict network access to your SCADA system. It should be isolated from public networks and, ideally, from general business networks. Implement strict firewall rules to control all traffic in and out.
2. **Implement Strong Authentication and Access Control:**
* **Multi-Factor Authentication (MFA):** Require multiple forms of authentication (e.g., password plus a code from a phone) for all access, especially for administrative accounts.
* **Role-Based Access Control (RBAC):** Grant users only the minimum access privileges they need to perform their jobs.
3. **Monitor and Detect:** Your security team should actively monitor system logs and network traffic. Pay close attention to:
* Any unauthorized access attempts.
* Suspicious POST requests, particularly those with unusual or manipulated parameters.
4. **Patch Immediately:** Upgrade to the secure versions:
* mySCADA PRO Manager v1.3
* mySCADA PRO Runtime v9.2.1
5. **Harden Your Security Configuration:**
* **Disable Unnecessary Services:** Turn off any features or services within mySCADA myPRO that are not absolutely required.
* **Enforce Network Segmentation:** Reinforce the isolation of your SCADA network.
* **Application Whitelisting:** Configure the system to allow only pre-approved software to run, preventing malicious code from executing.
6. **Plan for the Worst:**
* **Disaster Recovery Planning:** Have a detailed plan in place to recover your systems in the event of a successful attack.
* **Incident Response Exercises:** Regularly practice your response to a potential attack. This will help minimize downtime and damage.
NCERT has stressed that failing to address these vulnerabilities could lead to significant industrial disruptions, financial losses, and potentially dangerous safety incidents. Organizations using mySCADA myPRO must act immediately to secure their systems. Consult official security advisories for the latest details and updates on these vulnerabilities.