
In this document, produced by SEK’s Cyber Threat Intelligence team, the main vulnerabilities cataloged in the last month are listed.

The highlights critical and high-severity vulnerabilities in industrial environments that may enable remote code execution, authentication bypass, and denial-of-service attacks, impacting widely used OT and ICS technologies.