Artwork

Content provided by Daily Security Review. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Daily Security Review or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Critical Flaws in Microsens NMP Web+ Threaten Industrial Network Security

43:40
 
Share
 

Manage episode 492162387 series 3645080
Content provided by Daily Security Review. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Daily Security Review or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

In a major red flag for the industrial cybersecurity community, three newly disclosed vulnerabilities in Microsens NMP Web+, a popular network management solution used across critical infrastructure, have revealed just how fragile many ICS environments remain. The flaws—two rated critical and one high—allow unauthenticated attackers to bypass authentication, generate forged JWTs, and execute arbitrary code, potentially enabling full system compromise with no credentials required.

Discovered by security researcher Noam Moshe, the vulnerabilities demonstrate how a combination of weak authentication mechanisms and insecure file handling can open the door to devastating attacks. While patches have now been released, some vulnerable systems remain internet-exposed, prompting urgent warnings from CISA—especially for those in the critical manufacturing sector.

In this episode, we dive into what went wrong, why these bugs are so dangerous, and how this incident reflects a deeper and systemic challenge in ICS security.

Topics covered include:

  • The technical anatomy of the vulnerabilities (CVE-2025-49151, CVE-2025-49153, CVE-2025-49152) and how attackers can chain them for full remote access.
  • Why ICS systems—unlike traditional IT—face unique challenges around patching, downtime tolerance, and legacy software dependencies.
  • The dangerous rise of internet-exposed ICS systems, with over 145,000 devices globally found accessible via public scans.
  • The critical role of vendor patching, network segmentation, and compensating controls when downtime prevents immediate updates.
  • Strategic best practices like:
    • Building dedicated ICS test environments for patch validation
    • Using firewalls and virtual patching to buy time when updates can’t be applied
    • Adopting zero-trust architecture and isolating OT from business IT networks
  • The persistent convergence of IT and OT networks, creating new attack surfaces if not tightly managed
  • Real-world consequences of ICS vulnerabilities: from ransomware shutting down production lines to malware causing device malfunction and downtime

Microsens isn’t the only vendor in the spotlight—this episode sheds light on an industry-wide problem where security is often deprioritized in favor of uptime, and vendors may still use outdated design practices like hardcoded credentials or unexpired tokens.

For CISOs, OT engineers, and asset owners in manufacturing, energy, and industrial sectors, this is a critical wake-up call. Patching can’t be reactive—it must be strategic, tested, and integrated with operational priorities. Because when ICS systems go down, it’s not just data at risk—it’s the infrastructure behind national economies and physical safety.

  continue reading

189 episodes

Artwork
iconShare
 
Manage episode 492162387 series 3645080
Content provided by Daily Security Review. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Daily Security Review or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

In a major red flag for the industrial cybersecurity community, three newly disclosed vulnerabilities in Microsens NMP Web+, a popular network management solution used across critical infrastructure, have revealed just how fragile many ICS environments remain. The flaws—two rated critical and one high—allow unauthenticated attackers to bypass authentication, generate forged JWTs, and execute arbitrary code, potentially enabling full system compromise with no credentials required.

Discovered by security researcher Noam Moshe, the vulnerabilities demonstrate how a combination of weak authentication mechanisms and insecure file handling can open the door to devastating attacks. While patches have now been released, some vulnerable systems remain internet-exposed, prompting urgent warnings from CISA—especially for those in the critical manufacturing sector.

In this episode, we dive into what went wrong, why these bugs are so dangerous, and how this incident reflects a deeper and systemic challenge in ICS security.

Topics covered include:

  • The technical anatomy of the vulnerabilities (CVE-2025-49151, CVE-2025-49153, CVE-2025-49152) and how attackers can chain them for full remote access.
  • Why ICS systems—unlike traditional IT—face unique challenges around patching, downtime tolerance, and legacy software dependencies.
  • The dangerous rise of internet-exposed ICS systems, with over 145,000 devices globally found accessible via public scans.
  • The critical role of vendor patching, network segmentation, and compensating controls when downtime prevents immediate updates.
  • Strategic best practices like:
    • Building dedicated ICS test environments for patch validation
    • Using firewalls and virtual patching to buy time when updates can’t be applied
    • Adopting zero-trust architecture and isolating OT from business IT networks
  • The persistent convergence of IT and OT networks, creating new attack surfaces if not tightly managed
  • Real-world consequences of ICS vulnerabilities: from ransomware shutting down production lines to malware causing device malfunction and downtime

Microsens isn’t the only vendor in the spotlight—this episode sheds light on an industry-wide problem where security is often deprioritized in favor of uptime, and vendors may still use outdated design practices like hardcoded credentials or unexpired tokens.

For CISOs, OT engineers, and asset owners in manufacturing, energy, and industrial sectors, this is a critical wake-up call. Patching can’t be reactive—it must be strategic, tested, and integrated with operational priorities. Because when ICS systems go down, it’s not just data at risk—it’s the infrastructure behind national economies and physical safety.

  continue reading

189 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play