Headline
CVE-2023-31167: Industrial Cybersecurity Technology for ICS/OT Asset Visibility | Dragos
Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in Schweitzer Engineering Laboratories SEL-5036 acSELerator Bay Screen Builder Software on Windows allows Relative Path Traversal.
SEL acSELerator Bay Screen Builder software is distributed by SEL-5033 SEL acSELerator RTAC, SEL-5030 Quickset, and SEL Compass. CVE-2023-31167 and was patched in the acSELerator Bay Screen Builder release available on 20230602. Please contact SEL for additional details.
This issue affects SEL-5036 acSELerator Bay Screen Builder Software: before 1.0.49152.778.
Industrial Cybersecurity for OT Environments
The most effective OT cybersecurity platform, codifying threat intelligence and insights from the industry’s largest team of ICS/OT practitioners.
Discover Why Dragos
Visibility, Detection, and Response for OT Cyber Threats and Vulnerabilities
The Dragos Platform gives you visibility into your ICS/OT assets, vulnerabilities, threats, and response actions, and supports you with forensics and OT-specific playbooks.
In-Depth Asset Visibility
The Dragos Platform analyzes multiple data sources including protocols, network traffic, data historians, host logs, asset characterizations, and anomalies to provide unmatched visibility of your ICS/OT environment.
Unrivaled Threat Detection
Based on the industry’s best threat intelligence, pinpoint malicious activity on your ICS/OT network, providing in-depth context for alerts, and reducing false positives for unparalleled threat detection.
Dragos Platform
OT Expertise Codified
Comprehensive Vulnerability Management
The only ICS/OT solution that provides corrected, prioritized guidance with full lifecycle vulnerability management, tracking historical disposition through automated collection & analysis.
Investigation and Response
Expert-authored playbooks to guide your security team step-by-step throughout investigations, decreasing response time and improving the efficiency of your team’s workflow.
Your Path to Industrial Cybersecurity
Secure Your Digital Transformation
Successfully transform your business and keep your operational technology (OT) environments secure.
Industrial Cyber Risk Management
Assess your industrial cyber risk and confidently respond to cyber incidents.
Ensure ICS/OT Cybersecurity Compliance
Create simplified, repeatable processes to meet audit and compliance requirements faster and more accurately.
Solve Your Challenges
Start My Industrial Cybersecurity Program
Are you ready to get your ICS/OT cybersecurity challenges under control? We are here to help you take the next step.
Improve Visibility of My OT Assets
You can’t protect what you can’t see. A successful OT security posture maintains an inventory of assets, maps vulnerabilities against those assets, and actively monitors traffic for potential threats.
Defend Against Ransomware in OT
OT networks can be directly impacted when ransomware cripples IT. Know what you can do to better protect against this increasing threat.
Understand the Global Threat Landscape
Dragos Worldview Threat Intelligence provides the proactive information you need to stay ahead of sophisticated industrial cybersecurity threats.
Leverage MITRE ATT&CK for ICS
See how defenders can operationalize MITRE ATT&CK for ICS with the Dragos Platform and Worldview Threat Intelligence.
The Leader in Industrial Cybersecurity
Dragos has unmatched experience securing industrial assets across vertical industries.
Chemical
Chemical
Protect the operational technology that helps run chemical production facilities and the valuable intellectual property regarding chemical formulas from a potential cyber attack.
Electric
Electric
Take a proactive, holistic approach to protect the full spectrum of operations and defend your critical electric infrastructure.
Food & Bev
Food & Bev
Benefit from in-depth visibility of assets and threats in your environment, along with playbooks to guide analysts step-by-step as they investigate potential incidents.
Manufacturing
Manufacturing
Analyze the entire spectrum of manufacturing production inputs from support systems, quality control systems, material handling technologies, and automation/control technologies.
Oil & Gas
Oil & Gas
Combine OT threat intelligence, professional services, and the most effective and efficient ICS cybersecurity technology to enhance visibility, detection, and response capabilities in oil and gas environments.
Pharmaceuticals
Pharmaceuticals
Analyze the entire OT spectrum—including systems for processing, quality control, enterprise resource planning, and other critical operations
Transportation
Transportation
Understand supply chain vulnerabilities, IT to OT convergence, and manage network asset inventory in order to systematically reduce cyber risk.
Water
Water
Protect community water & wastewater systems by preventing significant breaches with proactive defense.
We Understand Industrial Adversaries Better Than Anyone — So You Can Too
Our experts are the leading authorities in ICS/OT cybersecurity, with real-world experience with landmark attacks on OT networks.
Jodi Schatz
Chief Product Officer
Jon Lavender
Chief Technology Officer and Head of Product
Christophe Culine
President of Global Sales and Chief Revenue Officer
Ben Miller
Vice President Professional Services and R&D
Robert M. Lee
Chief Executive Officer
What Dragos Customers Say
“We are convinced that Dragos has significantly helped us increase our overall security posture – as well as our ability to provide the best service possible to our customers. We couldn’t ask for anything better.”
“The Dragos OT Watch team, enabled by Dragos Platform technology, provides a level of visibility into our assets and threats that we did not have the expertise nor the bandwidth to do on our own.”
Doug Short,
CIO & CISO Trinity River Authority of Texas
“Where Dragos differentiates from many [competitors] is in the ICS-focused expertise of its team, reflected in its intelligence-centric approach, where its deep and detailed knowledge of the specifics of the ICS threat landscape are born out of experience.”
Working together with partners to protect you
No matter where you are on your ICS/OT cybersecurity journey, we have the products and services you need. Let us help get you on the path to success.