CouRRier News Today
CouRRier News Today
Skip to content
  • Cybersecurity
  • Weather
  • Life
  • Sports
  • Loot
  • Local
  • FORUM

June 2024

There were 1,723 posts published in June 2024 (this is page 143 of 173).

Post navigation

Dan Hurley: From a bingo hall to coach of the Los Angles Lakers?

Dan Hurley may be headed to the Lakers. It was probably inevitable.

in Sports | June 6, 2024 | 12 Words

Chiefs reportedly bringing back receiver Mecole Hardman on 1-year deal

Receiver and return specialist Mecole Hardman is reportedly re-signing with the Kansas City Chiefs on a one-year contract.

in Sports | June 6, 2024 | 18 Words

Fantasy Baseball Weekend Preview: Blueprint to finishing Week 10 on a high note

There are plenty of pitchers to stream in fantasy baseball leagues and hitters to consider in some lopsided matchups.

in Sports | June 6, 2024 | 19 Words

Coaching the Lakers is a hard job to pass up, except maybe Dan Hurley should

History is littered with successful college basketball coaches who took a shot at leaping to the NBA but failed spectacularly.

in Sports | June 6, 2024 | 20 Words

From Deep: These 3 players dropped their 2024-25 fantasy basketball draft stock in the NBA Playoffs

After highlighting some players who boosted their fantasy basketball stock for next season, it’s time to see who’s on the opposite end of the spectrum after the NBA Playoffs.

in Sports | June 6, 2024 | 29 Words

Toyota Subsidiary to Close its Largest U.S. Plant, Cut 1,300 Jobs

in Money, News | June 6, 2024 | 0 Words

2024 NBA Finals predictions: Will Celtics or Mavs win it all? And who wins Finals MVP?

Who will be crowned champions? Our staff offers 24 takes on the ’24 Finals.

in Sports | June 6, 2024 | 13 Words

Celtics tap Tom Brady to hype up fans, while Mavericks counter with Patrick Mahomes

The Boston Celtics featured Tom Brady and his championship experience in their documentary series following the quest for a 2023-24 NBA championship.

in Sports | June 6, 2024 | 22 Words

Hezbollah launches drone attack on Hurfeish, Israel

Thursday, June 6, 2024 

Israel–Palestine conflict
Related articles
  • 6 June 2024: Hezbollah launches drone attack on Hurfeish, Israel
  • 6 June 2024: Hezbollah attacks Israel, causes wildfires
  • 3 June 2024: Tens of thousands of people join the Israeli day parade
  • 29 May 2024: Hamas fires rockets at Tel Aviv
  • 17 April 2022: Clash between Palestinians and Israeli forces leaves at least 155 injured
Symbol for peace between Israel and Palestine
Collaborate!
  • Pillars of Wikinews writing
  • Writing an article

On Wednesday, multiple drones from the Iranian-backed Islamist group Hezbollah, struck the town of Hurfeish in northern Israel, injuring eleven people. Hezbollah is based in Lebanon and listed as a terrorist organization by the United States.

The Times of Israel also said that one person was in critical condition.

The emergency sirens reportedly were not heard during the strikes. The Israel Defense Force said it was looking into why this had happened.

Over the course of the post-October 7 escalation of the Israel-Palestine conflict, Hezbollah has launched a variety of strikes against Israel, using 4,000 rockets and killing multiple soldiers and ten civilians. These attacks and the Israeli response have forced tens of thousands of civilians to be evacuated.


Have an opinion on this story? Share it!

Related news

[edit]

  • “Hezbollah attacks Israel, causes wildfires” — Wikinews, June 6, 2024

Sources

[edit]

  • “Explosive-laden drone attack injures 11 in Hurfeish, northern Israel” — i24 News, June 5, 2024
  • “Hezbollah takes responsibility for attack on northern town of Hurfeish” — The Times of Israel, June 5, 2024
  • Chantal Da Silva and Abigail Williams. “Gunman attacks U.S. Embassy in Beirut; Israel ‘prepared for strong action’ on Lebanon, Netanyahu says” — NBC News, June 5, 2024
  • Seth J. Frantzman. “The fires in northern Israel are a wake-up call to complacency – analysis” — The Jerusalem Post, June 4, 2024
  • “Lebanese Hezbollah” — Congressional Research Service, May 10, 2024

Share this: 
E-mail this story
Share on Facebook
Share on reddit.com
Share on LinkedIn.com
Share on twitter.com


in News | June 6, 2024 | 281 Words

Emerson Ovation

View CSAF

1. EXECUTIVE SUMMARY

  • CVSS v3 9.8
  • ATTENTION: Exploitable remotely/low attack complexity
  • Vendor: Emerson
  • Equipment: Ovation
  • Vulnerabilities: Missing Authentication for Critical Function, Insufficient Verification of Data Authenticity

CISA is aware of a public report, known as “OT:ICEFALL”, detailing vulnerabilities found in multiple operational technology (OT) vendors. CISA is issuing this advisory to provide notice of the reported vulnerabilities and identify baseline mitigations for reducing risks to these and other cybersecurity attacks.

2. RISK EVALUATION

Successful exploitation of these vulnerabilities could allow remote code execution, loss of sensitive information, denial-of-service, or allow an attacker to modify the controller configuration.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following Emerson products are affected:

  • Ovation: Version 3.8.0 Feature Pack 1 and prior

3.2 Vulnerability Overview

3.2.1 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306

The affected product has several protocols that have no authentication, which could allow an attacker to change controller configuration or cause a denial-of-service condition.

CVE-2022-29966 has been assigned to this vulnerability. A CVSS v3.1 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

A CVSS v4 score has also been calculated for CVE-2022-29966. A base score of 9.3 has been calculated; the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N).

3.2.2 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY CWE-345

The affected product was found to have no authentication of firmware signing and relies on an insecure checksum for integrity. This could allow an attacker to push malicious firmware images, cause a denial-of-service condition, or achieve remote code execution.

CVE-2022-30267 has been assigned to this vulnerability. A CVSS v3.1 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

A CVSS v4 score has also been calculated for CVE-2022-30267. A base score of 8.7 has been calculated; the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N).

3.3 BACKGROUND

  • CRITICAL INFRASTRUCTURE SECTORS: Energy
  • COUNTRIES/AREAS DEPLOYED: Worldwide
  • COMPANY HEADQUARTERS LOCATION: United States

3.4 RESEARCHER

Daniel dos Santos and Jos Wetzels from Forescout Technologies reported these vulnerabilities to CISA

4. MITIGATIONS

Emerson recommends the following:

  • Upgrade to the currently available release of Ovation 3.8.0 Feature Pack 3 for remediation of many of the identified vulnerabilities.
  • Users are advised to consider the use of OCR3000 controllers, which offer an extra layer of protection that is not available to older controller models.
  • Deploy and configure Ovation systems and related components as described in the Cybersecurity for Ovation Systems manual (OVREF1000). Ovation Users’ Group Website (User Manuals | Reference Manuals) (login required)
  • Users with questions or concerns regarding the impact of these vulnerabilities on Ovation should contact the
    Ovation-CERT by email or phone (1-800-445-9723, option 3).

CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as:

  • Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.
  • Locate control system networks and remote devices behind firewalls and isolating them from business networks.
  • When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.

5. UPDATE HISTORY

  • June 6, 2024: Initial Publication
in Cybersecurity, DHS | June 6, 2024 | 727 Words

Post navigation

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • July 2020
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • June 2013
  • April 2012
  • March 2012
  • February 2012
  • October 1839

Meta

  • Log in
Independent Publisher empowered by WordPress