Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-31167: Industrial Cybersecurity Technology for ICS/OT Asset Visibility | Dragos​

Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in Schweitzer Engineering Laboratories SEL-5036 acSELerator Bay Screen Builder Software on Windows allows Relative Path Traversal.

SEL acSELerator Bay Screen Builder software is distributed by SEL-5033 SEL acSELerator RTAC, SEL-5030 Quickset, and SEL Compass. CVE-2023-31167 and was patched in the acSELerator Bay Screen Builder release available on 20230602. Please contact SEL for additional details.

This issue affects SEL-5036 acSELerator Bay Screen Builder Software: before 1.0.49152.778.

CVE
#vulnerability#mac#windows#git#intel#auth

Industrial Cybersecurity for OT Environments​

The most effective OT cybersecurity platform, codifying threat intelligence and insights from the industry’s largest team of ICS/OT practitioners.

Discover Why Dragos

Visibility, Detection, and Response for OT Cyber Threats and Vulnerabilities

The Dragos Platform gives you visibility into your ICS/OT assets, vulnerabilities, threats, and response actions, and supports you with forensics and OT-specific playbooks.

In-Depth Asset Visibility

The Dragos Platform analyzes multiple data sources including protocols, network traffic, data historians, host logs, asset characterizations, and anomalies to provide unmatched visibility of your ICS/OT environment.

Unrivaled Threat Detection

Based on the industry’s best threat intelligence, pinpoint malicious activity on your ICS/OT network, providing in-depth context for alerts, and reducing false positives for unparalleled threat detection.

Dragos Platform

OT Expertise Codified

Comprehensive Vulnerability Management

The only ICS/OT solution that provides corrected, prioritized guidance with full lifecycle vulnerability management, tracking historical disposition through automated collection & analysis.

Investigation and Response

Expert-authored playbooks to guide your security team step-by-step throughout investigations, decreasing response time and improving the efficiency of your team’s workflow.

Your Path to Industrial Cybersecurity

Secure Your Digital Transformation

Successfully transform your business and keep your operational technology (OT) environments secure.

Industrial Cyber Risk Management

Assess your industrial cyber risk and confidently respond to cyber incidents.

Ensure ICS/OT Cybersecurity Compliance

Create simplified, repeatable processes to meet audit and compliance requirements faster and more accurately.

Solve Your Challenges

Start My Industrial Cybersecurity Program

Are you ready to get your ICS/OT cybersecurity challenges under control? We are here to help you take the next step.

Improve Visibility of My OT Assets

You can’t protect what you can’t see. A successful OT security posture maintains an inventory of assets, maps vulnerabilities against those assets, and actively monitors traffic for potential threats.

Defend Against Ransomware in OT

OT networks can be directly impacted when ransomware cripples IT. Know what you can do to better protect against this increasing threat.

Understand the Global Threat Landscape

Dragos Worldview Threat Intelligence provides the proactive information you need to stay ahead of sophisticated industrial cybersecurity threats.

Leverage MITRE ATT&CK for ICS

See how defenders can operationalize MITRE ATT&CK for ICS with the Dragos Platform and Worldview Threat Intelligence.

The Leader in Industrial Cybersecurity

Dragos has unmatched experience securing industrial assets across vertical industries.

Chemical

Chemical

Protect the operational technology that helps run chemical production facilities and the valuable intellectual property regarding chemical formulas from a potential cyber attack.

Electric

Electric

Take a proactive, holistic approach to protect the full spectrum of operations and defend your critical electric infrastructure.

Food & Bev

Food & Bev

Benefit from in-depth visibility of assets and threats in your environment, along with playbooks to guide analysts step-by-step as they investigate potential incidents.

Manufacturing

Manufacturing

Analyze the entire spectrum of manufacturing production inputs from support systems, quality control systems, material handling technologies, and automation/control technologies.

Oil & Gas

Oil & Gas

Combine OT threat intelligence, professional services, and the most effective and efficient ICS cybersecurity technology to enhance visibility, detection, and response capabilities in oil and gas environments.

Pharmaceuticals

Pharmaceuticals

Analyze the entire OT spectrum—including systems for processing, quality control, enterprise resource planning, and other critical operations

Transportation

Transportation

Understand supply chain vulnerabilities, IT to OT convergence, and manage network asset inventory in order to systematically reduce cyber risk.

Water

Water

Protect community water & wastewater systems by preventing significant breaches with proactive defense.

We Understand Industrial Adversaries Better Than Anyone — So You Can Too

Our experts are the leading authorities in ICS/OT cybersecurity, with real-world experience with landmark attacks on OT networks.

Jodi Schatz

Chief Product Officer

Jon Lavender

Chief Technology Officer and Head of Product

Christophe Culine

President of Global Sales and Chief Revenue Officer

Ben Miller

Vice President Professional Services and R&D

Robert M. Lee

Chief Executive Officer

What Dragos Customers Say

“We are convinced that Dragos has significantly helped us increase our overall security posture – as well as our ability to provide the best service possible to our customers. We couldn’t ask for anything better.”

“The Dragos OT Watch team, enabled by Dragos Platform technology, provides a level of visibility into our assets and threats that we did not have the expertise nor the bandwidth to do on our own.”

Doug Short,

CIO & CISO Trinity River Authority of Texas

“Where Dragos differentiates from many [competitors] is in the ICS-focused expertise of its team, reflected in its intelligence-centric approach, where its deep and detailed knowledge of the specifics of the ICS threat landscape are born out of experience.”

Working together with partners to protect you

No matter where you are on your ICS/OT cybersecurity journey, we have the products and services you need. Let us help get you on the path to success.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907