Canadian Centre for Cyber Security Alerts & Advisories.
The Canadian Cyber Centre issues alerts and advisories on potential, imminent or actual cyber threats, vulnerabilities or incidents affecting Canada’s critical infrastructure.
- Grafana security advisory (AV25-394)by Canadian Centre for Cyber Security on July 3, 2025 at 8:05 pm
<article data-history-node-id="6510" about="/en/alerts-advisories/grafana-security-advisory-av25-394" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV25-394<br /><!–{C}%3C!%2D%2D%20DATES%20Pick%20one%20update%20the%20day%20xx%2C%20delete%20the%20rest%20%2D%2D%3E–><strong>Date: </strong>July 3, 2025</p> <p>On July 2, 2025, Grafana published a security advisory to address critical vulnerabilities in the following products:</p> <ul><li>Grafana Image Renderer – versions prior to 3.12.9</li> <li>Synthetic Monitoring Agent – versions prior to 0.38.3</li> </ul><p>The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://grafana.com/blog/2025/07/02/grafana-security-update-critical-severity-security-release-for-cve-2025-5959-cve-2025-6554-cve-2025-6191-and-cve-2025-6192-in-grafana-image-renderer-plugin-and-synthetic-monitoring-agent/">Grafana Security Advisory</a></li> </ul><!–{C}%3C!%2D%2D***************************************************%20END%20ADVISORY%20-English-******************************************************%2D%2D%3E–></div> </div> </div> </div> </div> </article>
- [Control systems] ABB security advisory (AV25-393)by Canadian Centre for Cyber Security on July 3, 2025 at 6:35 pm
<article data-history-node-id="6509" about="/en/alerts-advisories/control-systems-abb-security-advisory-av25-393" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV25-393<br /><!–{C}%3C!%2D%2D%20DATES%20Pick%20one%20update%20the%20day%20xx%2C%20delete%20the%20rest%20%2D%2D%3E–><strong>Date: </strong>July 3, 2025</p> <p>On July 3, 2025, ABB published a security advisory to address vulnerabilities in the following products:</p> <ul><li>RMC-100 – versions 2105457-043 to 2105457-045</li> <li>RMC-100 LITE – versions 2106229-015 to 2106229-016</li> </ul><p>The Cyber Centre encourages users and administrators to review the provided web links and perform the suggested mitigations.</p> <ul class="list-unstyled"><li><a href="https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A3623&LanguageCode=en&DocumentPartId=PDF&Action=Launch">ABB Cyber Security Advisory – Vulnerabilities in web UI (REST Interface) RMC-100</a></li> <li><a href="https://global.abb/group/en/technology/cyber-security/alerts-and-notifications">ABB Cyber security alerts and notifications</a></li> </ul><!–{C}%3C!%2D%2D***************************************************%20END%20ADVISORY%20-English-******************************************************%2D%2D%3E–></div> </div> </div> </div> </div> </article>
- Brother security advisory (AV25-392)by Canadian Centre for Cyber Security on July 3, 2025 at 6:17 pm
<article data-history-node-id="6508" about="/en/alerts-advisories/brother-security-advisory-av25-392" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV25-392<br /><strong>Date: </strong>July 3, 2025</p> <p>On June 19 and 25, 2025, Brother, Toshiba, Ricoh, Fujifilm and Konica Minolta released security advisories to address vulnerabilities in multiple products.</p> <p>The Cyber Centre encourages users and administrators to review the provided web links and perform the suggested mitigations.</p> <ul class="list-unstyled"><li><a href="https://support.brother.com/g/b/faqend.aspx?c=us&lang=en&prod=group2&faqid=faq00100846_000">Brother FAQs and Troubleshooting – Addressing Security Vulnerabilities</a></li> <li><a href="https://www.toshibatec.com/information/20250625_02.html">Toshiba – Response to vulnerability in some Toshiba Tec’s digital multi-function peripherals</a></li> <li><a href="https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2025-000007">Ricoh – Specific Ricoh MFP and Printer Products – Multiple vulnerabilities (CVE-2017-9765, CVE-2024-2169, CVE-2024-51977, CVE-2024-51979, CVE-2024-51980, CVE-2024-51981, CVE-2024-51982, CVE-2024-51983, CVE-2024-51984)</a></li> <li><a href="https://www.fujifilm.com/fbglobal/eng/company/news/notice/2025/0625_announce.html">Notice on Vulnerabilities in FUJIFILM Multifunction Devices and Printers</a></li> <li><a href="https://www.konicaminolta.com/global-en/security/advisory/pdf/km-2025-0001.pdf">Konica Minolta – Multiple vulnerabilities in B/W small multifunction and single-function printers</a></li> </ul></div> </div> </div> </div> </div> </article>
- Wing FTP security advisory (AV25-391)by Canadian Centre for Cyber Security on July 3, 2025 at 3:27 pm
<article data-history-node-id="6507" about="/en/alerts-advisories/wing-ftp-security-advisory-av25-391" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV25-391<br /><!–{C}%3C!%2D%2D%20DATES%20Pick%20one%20update%20the%20day%20xx%2C%20delete%20the%20rest%20%2D%2D%3E–><strong>Date: </strong> July 3, 2025</p> <p>On May 14, 2025, Wing FTP a published an update to address a critical vulnerability in the following product:</p> <ul><li>Wing FTP Server – version v7.4.3 and prior</li> </ul><p>Open-source reporting has indicated that proof-of-concept exploit code is available for CVE-2025-47812.</p> <p>The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://www.wftpserver.com/serverhistory.htm">Wing FTP Server v7.4.4</a></li> </ul><!–{C}%3C!%2D%2D***************************************************%20END%20ADVISORY%20-English-******************************************************%2D%2D%3E–></div> </div> </div> </div> </div> </article>
- HPE security advisory (AV25-390)by Canadian Centre for Cyber Security on July 3, 2025 at 3:11 pm
<article data-history-node-id="6506" about="/en/alerts-advisories/hpe-security-advisory-av25-390" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV25-390<br /><strong>Date: </strong>July 7, 2025</p> <p>On July 2, 2025, HPE published a security advisory to address a vulnerability in the following product:</p> <ul><li>HPE Telco Service Orchestrator – versions prior to v5.3.3</li> </ul><p>The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04886en_us&docLocale=en_US">HPE Security Bulletin – HPESBNW04886 rev.1 – HPE Telco Service Orchestrator Software, Server-Side Request Forgery (SSRF) Vulnerability</a></li> <li><a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">HPE Security Bulletin Library</a></li> </ul></div> </div> </div> </div> </div> </article>
- Drupal security advisory (AV25-389)by Canadian Centre for Cyber Security on July 3, 2025 at 2:35 pm
<article data-history-node-id="6505" about="/en/alerts-advisories/drupal-security-advisory-av25-389" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV25-389<br /><!–{C}%3C!%2D%2D%20DATES%20Pick%20one%20update%20the%20day%20xx%2C%20delete%20the%20rest%20%2D%2D%3E–><strong>Date: </strong>July 3, 2025</p> <p>On July 2, 2025, Drupal published security advisories to address vulnerabilities in the following products :</p> <ul><li>Config Pages Viewer – versions prior to 1.0.4</li> <li>Two-factor Authentication (TFA) – versions prior to 1.11.0</li> </ul><p>The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://www.drupal.org/sa-contrib-2025-086">Config Pages Viewer – Critical – Access bypass – SA-CONTRIB-2025-086</a></li> <li><a href="https://www.drupal.org/sa-contrib-2025-085">Two-factor Authentication (TFA) – Less critical – Access bypass – SA-CONTRIB-2025-085</a></li> <li><a href="https://www.drupal.org/security">Drupal Security Advisories</a></li> </ul></div> </div> </div> </div> </div> </article>
- Cisco security advisory (AV25-388)by Canadian Centre for Cyber Security on July 2, 2025 at 6:08 pm
<article data-history-node-id="6504" about="/en/alerts-advisories/cisco-security-advisory-av25-388" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV25-388<br /><strong>Date: </strong>July 2, 2025</p> <p>On July 2, 2025, Cisco published security advisories to address vulnerabilities in the following products:</p> <ul><li>Cisco BroadWorks Application Delivery Platform – versions prior to RI.2025.05</li> <li>Cisco Enterprise Chat and Email – version 11 and versions prior to 12.6(1)_ES11</li> <li>Cisco Spaces Connector – versions prior to Connector 3-Jun 2025</li> <li>Cisco Unified Communications Manager – versions 15.0.1.13010-1 to 15.0.1.13017-1</li> <li>Cisco Unified Communications Manager Session Management Edition Engineering Special (ES) – versions 15.0.1.13010-1 to 15.0.1.13017-1</li> </ul><p>The Cyber Centre encourages users and administrators to review the provided web links, perform the suggested mitigations and apply the necessary updates if available.</p> <ul class="list-unstyled"><li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-xss-O696ymRA">Cisco BroadWorks Application Delivery Platform Cross-Site Scripting Vulnerability</a></li> <li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-xss-CbtKtEYc">Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability</a></li> <li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-spaces-conn-privesc-kgD2CcDU">Cisco Spaces Connector Privilege Escalation Vulnerability</a></li> <li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-ssh-m4UBdpE7">Cisco Unified Communications Manager Static SSH Credentials Vulnerability</a></li> <li><a href="https://tools.cisco.com/security/center/publicationListing.x">Cisco Security Advisories</a></li> </ul></div> </div> </div> </div> </div> </article>
- Citrix security advisory (AV25-387)by Canadian Centre for Cyber Security on July 2, 2025 at 5:30 pm
<article data-history-node-id="6503" about="/en/alerts-advisories/citrix-security-advisory-av25-387" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV25-387<br /><strong>Date: </strong>July 2, 2025</p> <p>On July 2, 2025, Citrix published a security advisory to address a vulnerability in the following product:</p> <ul><li>XenServer 8.4</li> </ul><p>The Cyber Centre encourages users and administrators to review the provided web links and perform the suggested mitigations.</p> <ul class="list-unstyled"><li><a href="https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694780&articleURL=XenServer_Security_Update_for_CVE_2025_27465">Citrix Security Advisory – CTX694780</a></li> <li><a href="https://support.citrix.com/knowledge-center#/?ct=Security%20Bulletins&searchText=&sortBy=Created%20date&pageIndex=1">Citrix Security Advisories</a></li> </ul></div> </div> </div> </div> </div> </article>
- Microsoft Edge security advisory (AV25-386)by Canadian Centre for Cyber Security on July 2, 2025 at 4:05 pm
<article data-history-node-id="6502" about="/en/alerts-advisories/microsoft-edge-security-advisory-av25-386" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV25-386<br /><strong>Date: </strong>July 2, 2025</p> <p>On July 1, 2025, Microsoft published a security update to address a vulnerability in the following product:</p> <ul><li>Microsoft Edge Stable Channel – versions prior to 138.0.3351.65</li> </ul><p>Google is aware that an exploit for CVE-2025-49713 exists in the wild.</p> <p>The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary update.</p> <ul class="list-unstyled"><li><a href="https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#july-1-2025">Microsoft Edge Stable Channel Release Notes</a></li> </ul></div> </div> </div> </div> </div> </article>
- Google Chrome security advisory (AV25-385)by Canadian Centre for Cyber Security on July 2, 2025 at 3:58 pm
<article data-history-node-id="6501" about="/en/alerts-advisories/google-chrome-security-advisory-av25-385" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV25-385<br /><strong>Date: </strong>July 2, 2025</p> <p>On June 30, 2025, Google published a security advisory to address a vulnerability in the following products:</p> <ul><li>Stable Channel Chrome for Desktop – versions prior to 138.0.7204.96/97 (Windows), 138.0.7204.92/93 (Mac), and 138.0.7204.92 (Linux)</li> </ul><p>Google is aware that an exploit for CVE-2025-6554 exists in the wild.</p> <p>The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates, when available.</p> <ul class="list-unstyled"><li><a href="https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html">Google Chrome Security Advisory</a></li> </ul></div> </div> </div> </div> </div> </article>
- Dell security advisory (AV25-384)by Canadian Centre for Cyber Security on June 30, 2025 at 6:12 pm
<article data-history-node-id="6500" about="/en/alerts-advisories/dell-security-advisory-av25-384" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV25-384<br /><!–{C}%3C!%2D%2D%20DATES%20Pick%20one%20update%20the%20day%20xx%2C%20delete%20the%20rest%20%2D%2D%3E–><strong>Date: </strong>June 30, 2025</p> <p>Between June 23 and 29, 2025, Dell published security advisories to address vulnerabilities for the following products:</p> <ul><li>iDRAC10 – versions prior to 1.20.50.50</li> <li>NetWorker – versions 19.12 to 19.12.0.1 and versions prior to 19.11.0.5</li> <li>Dell Open Manage Network Integration – versions prior to 3.7</li> <li>Dell PowerMax EEM 5978 – versions prior to 5978.714.714.10730</li> <li>Dell PowerMax EEM 10.2.0.1 – versions prior to 10.2.01 Patch 10732</li> <li>Dell PowerMaxOS 5978 – versions prior to 5978.714.714.10730</li> <li>Dell PowerMax OS 10.2.0.1 – versions prior to 10.2.0.1 Patch 10732</li> <li>PowerProtect Cyber Recovery – versions prior to 19.20</li> <li>Dell Secure Connect Gateway – Appliance – versions prior to 5.30.0.14</li> <li>Solutions Enabler – versions prior to 9.2.4.11 and versions prior to 10.2.0.5</li> <li>Dell Storage Monitoring and Reporting – versions prior to 5.1.1.0</li> <li>Dell Storage Resource Manager (SRM) – versions prior to 5.1.1.0</li> <li>Unisphere for PowerMax – versions prior to 9.2.4.17 and versions prior to 10.2.0.12</li> <li>Unisphere 360 – versions prior to 9.2.4.37</li> </ul><p>The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://www.dell.com/support/security/en-ca">Dell Security advisories and notices</a></li> </ul><!–{C}%3C!%2D%2D***************************************************%20END%20ADVISORY%20-English-******************************************************%2D%2D%3E–></div> </div> </div> </div> </div> </article>
- IBM security advisory (AV25-383)by Canadian Centre for Cyber Security on June 30, 2025 at 6:11 pm
<article data-history-node-id="6498" about="/en/alerts-advisories/ibm-security-advisory-av25-383" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV25-383<br /><!–{C}%3C!%2D%2D%20DATES%20Pick%20one%20update%20the%20day%20xx%2C%20delete%20the%20rest%20%2D%2D%3E–><strong>Date: </strong>June 30, 2025</p> <p>Between June 23 and 29, 2025, IBM published security advisories to address vulnerabilities in multiple products.</p> <p>The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://www.ibm.com/support/pages/bulletin/">IBM Product Security Incident Response</a></li> </ul><!–{C}%3C!%2D%2D***************************************************%20END%20ADVISORY%20-English-******************************************************%2D%2D%3E–></div> </div> </div> </div> </div> </article>
- Ubuntu security advisory (AV25-382)by Canadian Centre for Cyber Security on June 30, 2025 at 5:50 pm
<article data-history-node-id="6499" about="/en/alerts-advisories/ubuntu-security-advisory-av25-382" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV25-382<br /><strong>Date: </strong>June 30, 2025</p> <p>Between June 23 and 29, 2025, Ubuntu published security notices to address vulnerabilities in the Linux kernel affecting the following products:</p> <ul><li>Ubuntu 25.04</li> <li>Ubuntu 24.04 LTS</li> <li>Ubuntu 22.04 LTS</li> <li>Ubuntu 20.04 LTS</li> </ul><p>The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://ubuntu.com/security/notices">Ubuntu Security Notices</a></li> </ul></div> </div> </div> </div> </div> </article>
- [Control systems] CISA ICS security advisories (AV25-381)by Canadian Centre for Cyber Security on June 30, 2025 at 5:36 pm
<article data-history-node-id="6497" about="/en/alerts-advisories/control-systems-cisa-ics-security-advisories-av25-381" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV25-381<br /><strong>Date: </strong>June 30, 2025</p> <p>Between June 23 and 29, 2025, CISA published ICS advisories to address vulnerabilities in the following products:</p> <ul><li>ControlID iDSecure On-premises – version 4.7.48.0 and prior</li> <li>Delta Electronics CNCSoft – version v1.01.34 and prior</li> <li>Kaleris Navis N4 – versions prior to 4.0</li> <li>MICROSENS NMP WEB+ – version 3.2.5 and prior</li> <li>Mitsubishi Electric Air conditioning systems – multiple versions and models</li> <li>Parsons Utility Enterprise Data Management – versions 5.18, 5.03, 3.30, and versions 4.02 to 4.26</li> <li>Parsons AclaraONE Utility Portal – versions prior to 1.22</li> <li>Schneider Electric EVLink WallBox – all versions</li> <li>Schneider Electric Modicon Controllers M241 – versions prior to 5.3.12.51</li> <li>Schneider Electric Modicon Controllers M251 – versions prior to 5.3.12.51</li> <li>Schneider Electric Modicon Controllers M262 – versions prior to 5.3.9.18</li> <li>Schneider Electric Modicon Controllers M258 – all versions</li> <li>Schneider Electric Modicon Controllers LMC058 – all versions</li> <li>TrendMakers Sight Bulb Pro Firmware ZJ_CG32-2201 – version 8.57.83 and prior</li> </ul><p>The Cyber Centre encourages users and administrators to review the provided web link, perform the suggested mitigations and apply the necessary updates if available.</p> <ul class="list-unstyled"><li><a href="https://www.cisa.gov/news-events/cybersecurity-advisories">CISA ICS Advisories</a></li> </ul></div> </div> </div> </div> </div> </article>
- MongoDB security advisory (AV25-380)by Canadian Centre for Cyber Security on June 27, 2025 at 7:16 pm
<article data-history-node-id="6496" about="/en/alerts-advisories/mongodb-security-advisory-av25-380" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV25-380<br /><strong>Date: </strong>June 27, 2025</p> <p>On June 26, 2025, MongoDB published a security advisory to address a vulnerability in the following products:</p> <ul><li>MongoDB Server v6.0 – versions prior to 6.0.21</li> <li>MongoDB Server v7.0 – versions prior to 7.0.17</li> <li>MongoDB Server v8.0 – versions prior to 8.0.5</li> </ul><p>The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://jira.mongodb.org/browse/SERVER-106748">Pre-auth denial of service when accepting OIDC authentication</a></li> </ul></div> </div> </div> </div> </div> </article>
- VMware security advisory (AV25-379)by Canadian Centre for Cyber Security on June 27, 2025 at 12:42 pm
<article data-history-node-id="6489" about="/en/alerts-advisories/vmware-security-advisory-av25-379" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><!–{C}%3C!%2D%2D***************************************************%20START%20ADVISORY%20-English-%20******************************************************%2D%2D%3E–></p> <p><strong>Serial number: </strong>AV25-379<br /><!–{C}%3C!%2D%2D%20DATES%20Pick%20one%20update%20the%20day%20xx%2C%20delete%20the%20rest%20%2D%2D%3E–><strong>Date: </strong>June 27, 2025</p> <p>On June 26, 2025, VMware published a security advisory to address a vulnerability in the following product:</p> <ul><li>RabbitMQ – version 3.13.7 and prior</li> </ul><p>The Cyber Centre encourages users and administrators to review the provided web links and perform the suggested mitigations.</p> <ul class="list-unstyled"><li><a href="https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35875">Security Advisories – TNZ-2025-0041</a></li> <li><a href="https://support.broadcom.com/web/ecx/security-advisory">Security Advisories – Tanzu</a></li> </ul></div> </div> </div> </div> </div> </article>
- Microsoft Edge security advisory (AV25-378)by Canadian Centre for Cyber Security on June 27, 2025 at 12:37 pm
<article data-history-node-id="6488" about="/en/alerts-advisories/microsoft-edge-security-advisory-av25-378" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><!–{C}%3C!%2D%2D***************************************************%20START%20ADVISORY%20-English-%20******************************************************%2D%2D%3E–></p> <p><strong>Serial number: </strong>AV25-378<br /><!–{C}%3C!%2D%2D%20DATES%20Pick%20one%20update%20the%20day%20xx%2C%20delete%20the%20rest%20%2D%2D%3E–><strong>Date: </strong>June 27, 2025</p> <p>On June 26, 2025, Microsoft published a security update to address vulnerabilities in the following product:</p> <ul><li>Microsoft Edge Stable Channel – versions prior to 138.0.3351.55</li> </ul><p>The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary update.</p> <ul class="list-unstyled"><li><a href="https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#june-26-2025">Microsoft Edge Stable Channel Release Notes</a></li> </ul></div> </div> </div> </div> </div> </article>
- Vulnerabilities impacting Citrix NetScaler ADC and NetScaler Gateway – CVE-2025-5349, CVE-2025-5777 and CVE-2025-6543by Canadian Centre for Cyber Security on June 26, 2025 at 3:09 pm
<article data-history-node-id="6485" about="/en/alerts-advisories/vulnerabilities-impacting-citrix-netscaler-adc-netscaler-gateway-cve-2025-5349-cve-2025-5777-cve-2025-6543" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Number:</strong> AL25-008<br /><strong>Date:</strong> June 26, 2025</p> <h2>Audience</h2> <p>This Alert is intended for <abbr title="information technology">IT</abbr> professionals and managers of notified organizations.</p> <h2>Purpose</h2> <p>An Alert is used to raise awareness of a recently identified cyber threat that may impact cyber information assets, and to provide additional detection and mitigation advice to recipients. The Canadian Centre for Cyber Security ("Cyber Centre") is also available to provide additional assistance regarding the content of this Alert to recipients as requested.</p> <h2>Details</h2> <p>On June 17 and 25, 2025, Citrix published security advisories for critical vulnerabilities, CVE-2025-5349, CVE-2025-5777 and CVE-2025-6543, affecting the following products<sup id="fn1-rf"><a class="fn-lnk" href="#fn1"><span class="wb-inv">Footnote </span>1</a></sup><sup id="fn2-rf"><a class="fn-lnk" href="#fn2"><span class="wb-inv">Footnote </span>2</a></sup>:</p> <ul><li>NetScaler ADC 12.1-FIPS – versions prior to 12.1-55.328-FIPS</li> <li>NetScaler ADC and NetScaler Gateway 14.1 – versions prior to 14.1-47.46</li> <li>NetScaler ADC and NetScaler Gateway 13.1 – versions prior to 13.1-59.19</li> <li>NetScaler ADC 13.1-FIPS and NDcPP – versions prior to 13.1-37.236-FIPS and NDcPP</li> </ul><p>NetScaler ADC and NetScaler Gateway versions 12.1 and 13.0 are now End-Of-Life (EOL) and are no longer supported.</p> <p>For CVE-2025-5777 and CVE-2025-6543: NetScaler must be configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server for these vulnerabilities to be exploited.</p> <p>For CVE-2025-5349: An improper access control configured on NetScaler management interface would lead to an access to NSIP, to Cluster Management IP and to local GSLB Site IP.</p> <p>Citrix reports that exploitation of CVE-2025-6543 against unmitigated appliances has been observed. In response to these vulnerabilities, the Cyber Centre released AV25-350 on June 17<sup id="fn3-rf"><a class="fn-lnk" href="#fn3"><span class="wb-inv">Footnote </span>3</a></sup> and AV25-374 on June 25, 2025<sup id="fn4-rf"><a class="fn-lnk" href="#fn4"><span class="wb-inv">Footnote </span>4</a></sup>.</p> <p>The Cyber Centre is aware of online interest and speculation about these vulnerabilities and is publishing this Alert out of an abundance of caution.</p> <h2>Suggested actions</h2> <p>The Cyber Centre strongly recommends that organizations using Citrix NetScaler ADC and NetScaler Gateway appliances review the Citrix security bulletins<sup id="fn1a-rf"><a class="fn-lnk" href="#fn1"><span class="wb-inv">Footnote </span>1</a></sup><sup id="fn2a-rf"><a class="fn-lnk" href="#fn2"><span class="wb-inv">Footnote </span>2</a></sup> and update or upgrade the affected systems to the following versions:</p> <ul><li>NetScaler ADC and NetScaler Gateway 14.1-47.46 and later.</li> <li>NetScaler ADC and NetScaler Gateway 13.1-59.19 and later releases of 13.1.</li> <li>NetScaler ADC 13.1-FIPS and 13.1-NDcPP 13.1-37.236 and later releases of 13.1-FIPS and 13.1-NDcPP.</li> </ul><p>In addition, the Cyber Centre strongly recommends that organizations review and implement the Cyber Centre’s Top 10 <abbr title="information technology">IT</abbr> Security Actions<sup id="fn5-rf"><a class="fn-lnk" href="#fn5"><span class="wb-inv">Footnote </span>5</a></sup>.</p> <p>If activity matching the content of this alert is discovered, recipients are encouraged to report via the <a href="https://www.cyber.gc.ca/en/incident-management">My Cyber Portal</a>, or email <a href="mailto:contact@cyber.gc.ca">contact@cyber.gc.ca</a>.</p> <h2>References</h2> <aside class="wb-fnote" role="note"><dl><dt>Footnote 1</dt> <dd id="fn1"> <p><a href="https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX693420 ">NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-5349 and CVE-2025-5777</a></p> <p class="fn-rtn"><a href="#fn1-rf"><span class="wb-inv">Return to footnote</span>1<span class="wb-inv"> referrer</span></a></p> </dd> <dt>Footnote 2</dt> <dd id="fn2"> <p><a href="https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788&articleURL=NetScaler_ADC_and_NetScaler_Gateway_Security_Bulletin_for_CVE_2025_6543 ">NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-6543</a></p> <p class="fn-rtn"><a href="#fn2-rf"><span class="wb-inv">Return to footnote</span>2<span class="wb-inv"> referrer</span></a></p> </dd> <dt>Footnote 3</dt> <dd id="fn3"> <p><a href="/en/alerts-advisories/citrix-security-advisory-av25-350 ">AV25-350 – Citrix security advisory </a></p> <p class="fn-rtn"><a href="#fn3-rf"><span class="wb-inv">Return to footnote</span>3<span class="wb-inv"> referrer</span></a></p> </dd> <dt>Footnote 4</dt> <dd id="fn4"> <p><a href="/en/alerts-advisories/citrix-security-advisory-av25-374">AV25-374 – Citrix security advisory</a></p> <p class="fn-rtn"><a href="#fn4-rf"><span class="wb-inv">Return to footnote</span>4<span class="wb-inv"> referrer</span></a></p> </dd> <dt>Footnote 5</dt> <dd id="fn5"> <p><a href="/en/guidance/top-10-it-security-actions-protect-internet-connected-networks-and-information-itsm10089">Top 10 <abbr title="information technology">IT</abbr> security actions to protect internet connected networks and information (ITSM.10.089)</a></p> <p class="fn-rtn"><a href="#fn5-rf"><span class="wb-inv">Return to footnote</span>5<span class="wb-inv"> referrer</span></a></p> </dd> </dl></aside></div> </div> </div> </div> </div> </article>
- VMware security advisory (AV25-377)by Canadian Centre for Cyber Security on June 26, 2025 at 12:51 pm
<article data-history-node-id="6487" about="/en/alerts-advisories/vmware-security-advisory-av25-377" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><!–{C}%3C!%2D%2D***************************************************%20START%20ADVISORY%20-English-%20******************************************************%2D%2D%3E–></p> <p><strong>Serial number: </strong>AV25-377<br /><!–{C}%3C!%2D%2D%20DATES%20Pick%20one%20update%20the%20day%20xx%2C%20delete%20the%20rest%20%2D%2D%3E–><strong>Date: </strong>June 26, 2025</p> <p>On June 25, 2025, VMware published security advisories to address vulnerabilities in the following product:</p> <ul><li>VMware Tanzu for Postgres – versions 17.4.0, 16.8.0, 15.12.0, 14.17.0, 13.20.0</li> <li>VMware Tanzu for Postgres – versions 17.5.0, 16.9.0, 15.13.0, 14.18.0, 13.21.0</li> </ul><p>The Cyber Centre encourages users and administrators to review the provided web links and perform the suggested mitigations.</p> <ul class="list-unstyled"><li><a href="https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35866">Security Advisories – TNZ-2025-0039</a></li> <li><a href="https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35867">Security Advisories – TNZ-2025-0040</a></li> <li><a href="https://support.broadcom.com/web/ecx/security-advisory">Security Advisories – Tanzu</a></li> </ul></div> </div> </div> </div> </div> </article>
- Cisco security advisory (AV25-376)by Canadian Centre for Cyber Security on June 25, 2025 at 7:25 pm
<article data-history-node-id="6486" about="/en/alerts-advisories/cisco-security-advisory-av25-376" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><!–{C}%3C!%2D%2D***************************************************%20START%20ADVISORY%20-English-%20******************************************************%2D%2D%3E–></p> <p><strong>Serial number: </strong>AV25-376<br /><!–{C}%3C!%2D%2D%20DATES%20Pick%20one%20update%20the%20day%20xx%2C%20delete%20the%20rest%20%2D%2D%3E–><strong>Date: </strong>June 25, 2025</p> <p>On June 25, 2025, Cisco published a security advisory to address vulnerabilities in the following products:</p> <ul><li>Cisco ISE and ISE-PIC – versions prior to 3.3</li> <li>Cisco ISE and ISE-PIC – versions prior to 3.4</li> </ul><p>The Cyber Centre encourages users and administrators to review the provided web links, perform the suggested mitigations and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6">Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities </a></li> <li><a href="https://tools.cisco.com/security/center/publicationListing.x">Cisco Security Advisories</a></li> </ul></div> </div> </div> </div> </div> </article>