CouRRier News Today
CouRRier News Today
Skip to content
  • Cybersecurity
  • Weather
  • Life
  • Sports
  • Loot
  • Local
  • FORUM

September 2023

There were 1,516 posts published in September 2023 (this is page 63 of 152).

Post navigation

‘Autoworkers Will Not Have Any Jobs’: Donald Trump Slams UAW President, Warns That All EVs ‘Will Be Made In China’ — 2 Top EV Stocks No Matter Where The Cars Are Made

in Money, News | September 19, 2023 | 0 Words

Sean McVay addresses meaningless field goal that let Rams cover the spread

Yes, the NFL has many gambling-related issues that it should be concerned about.

in Sports | September 19, 2023 | 13 Words

How To Collect $1,000 Per Month From Warren Buffett’s Favorite Dividend Stock

in Money, News | September 19, 2023 | 0 Words

New USDA Study on Consumer Kitchen Behavior Underscores the Importance of Food Safety Education Month

WASHINGTON, Sept. 19, 2023 – The U.S. Department of Agriculture (USDA) is releasing during Food Safety Education Month the results from the final year of a five-year study that observed how consumers prepared meals. The study was produced by USDA’s Food Safety and Inspection Service (FSIS) as part of their efforts to highlight the importance of safe food handling practices.

in Life | September 19, 2023 | 59 Words

As USDA Sees Record Interest in Conservation and Clean Energy Programs, Swift Implementation of Inflation Reduction Act Funding Continues

WASHINGTON, DC, September 19, 2023 – On the heels of the first anniversary of President Biden’s Inflation Reduction Act, the U.S. Department of Agriculture (USDA) has seen record interest in the conservation and clean energy programs that received funding from the law. As a key part of President Biden’s Investing in America agenda, the Inflation Reduction Act is the nation’s largest-ever investment to combat climate change.

in Life | September 19, 2023 | 67 Words

Omron Engineering Software Zip-Slip

View CSAF

1. EXECUTIVE SUMMARY

  • CVSS v3 5.5
  • ATTENTION: Low attack complexity
  • Vendor: Omron
  • Equipment: Sysmac Studio, NX-IO Configurator
  • Vulnerability: Path Traversal

2. RISK EVALUATION

Successful exploitation of this vulnerability could allow an attacker to overwrite files on a system.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following versions of Omron engineering software are affected:

  • Sysmac Studio: version 1.54 and prior
  • NX-IO Configurator: version 1.22 and prior

3.2 Vulnerability Overview

3.2.1 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY (‘PATH TRAVERSAL’) CWE-22

DotNetZip.Semvered before 1.11.0 is vulnerable to directory traversal, which could allow attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry mishandled during extraction. This vulnerability is also known as “Zip-Slip.”

CVE-2018-1002205 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N).

3.3 BACKGROUND

  • CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing
  • COUNTRIES/AREAS DEPLOYED: Worldwide
  • COMPANY HEADQUARTERS LOCATION: Japan

3.4 RESEARCHER

Reid Wightman of Dragos reported this vulnerability to CISA. Michael Heinzl reported the Zip-Slip vulnerability to JPCERT/CC.

4. MITIGATIONS

OMRON recommends the following general mitigation measures to minimize the risk of vulnerability exploitation:

  • Anti-virus protection:
    • Protect any PC with access to the control system against malware and ensure installation and maintenance of up-to-date commercial grade anti-virus software protections. 
  • Security measures to prevent unauthorized access:
    • Minimize connection of control systems and equipment to open networks so untrusted devices will be
      unable to access them.
    • Implement firewalls (by shutting down unused communications ports, limiting communications hosts,
      etc.) and isolate them from the IT network.
    • Use a virtual private network (VPN) for remote access to control systems and equipment.
    • Use strong passwords and change them frequently.
    • Install physical controls so only authorized personnel can access control systems and equipment.
    • Scan for viruses to ensure safety of any USB drives or similar devices before connecting them to
      systems and devices.
    • Enforce multifactor authentication whenever possible of all devices with remote access to control
      systems and equipment.
  • Data input and output protection:

    • Perform process validation, such as backup validation or range checks, to cope with unintentional
      modification of input/output data to control systems and devices.
  • Data recovery:

    • Periodical data backup and maintenance to prevent data loss.

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as:

  • Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.
  • Locate control system networks and remote devices behind firewalls and isolating them from business networks.
  • When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time. This vulnerability is not exploitable remotely.

5. UPDATE HISTORY

  • September 19, 2023: Initial Publication
in Cybersecurity, DHS, U.S., US | September 19, 2023 | 621 Words

CISA Sponsors Third Season of US Cyber Team

in Cybersecurity, DHS, U.S., US | September 19, 2023 | 0 Words

An Age-By-Age Guide to Helping Kids Manage Homework

Do you ever wonder whether homework is gauging the child’s ability to complete assignments or the parent’s? On one end of the spectrum, a parent might never mention homework and assume it gets done independently; on the other end are the parents who micromanage to be sure every worksheet is absolutely perfect.

Read more…

in Life | September 19, 2023 | 56 Words

Canada’s Trans Mountain pipe expansion to disrupt oil flow to US, boost prices

in Money, News | September 19, 2023 | 0 Words

Mighty Mookie: How Betts is hitting well above his weight

Dodgers superstar Mookie Betts is small for slugger, but he’s about to become the fourth under-5-foot-10 player in MLB history to log a 40-homer season.

in Sports | September 19, 2023 | 26 Words

Post navigation

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • July 2020
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • June 2013
  • April 2012
  • March 2012
  • February 2012
  • October 1839

Meta

  • Log in
Independent Publisher empowered by WordPress