![]() When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available.Locate control system networks and remote devices behind firewalls and isolate them from business networks.Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet.Recommended practices for the affected product can be found in the TXpert Hub CoreTec 4 Software Manual.įor more information, see Hitachi security advisory 8DBD000081ĬISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability these vulnerabilities. This will not remove the vulnerable component, but it will remove the ability of an attacker to remotely access the command line interface and exploit the vulnerability.Īdditionally, Hitachi Energy recommends following product Security Deployment Guidelines. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |