• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 24th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Security

ReVuln Found 0day Vulnerabilities for SCADA Systems

November 23rd, 2012 Waqas Security 0 comments
ReVuln Found 0day Vulnerabilities for SCADA Systems
Share on FacebookShare on Twitter

In a video presentation, the vulnerability experts known as ReVuln have revealed a 0day vulnerability for industrial SCADA Schneider Electric, General Electric, Siemens and Rockwell Automation. Yet the exact vulnerable products were not discussed in the presentation.

According to ReVuln, the vulnerabilities are of high risk which allows uploading shells remotely, executing the code and session hijacking on the PCs that are responsible for running servers of SCADA installations. If ReVuln is correct in their claims then there are solid chances of taking over the SCADA servers as they are available on the internet due to their settings. The claims are yet not supported by any independent security expert.

An inside view by any independent security expert over the vulnerabilities will play an important role in backing up or denying the claims made by ReVuln as in past it had published the vulnerabilities when they were reveled by some other source or after being fixed.

SCADA systems are usually in news for their insecure servers and for the attacks carried out on them by the hackers. In past SCADA systems for Israel were hacked by Anonymous hackers and 7000 credit card details were leaked online.

  • Tags
  • #Anonymous Hacker
  • 0day Vulnerabilities
  • Israeli credit cards details
  • ReVuln
  • SCADA Systems
Facebook Twitter LinkedIn Pinterest
Previous article Cyber Crime Costs Financial Sector Billions in Losses
Next article Samsung To Launch Unbreakable, Bendable Phone Screen
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism

Related Posts
SonicWall hacked after 0-day flaws exploited by hackers

SonicWall hacked after 0-day flaws exploited by hackers

Gamarue malware found in UK Govt-funded laptops for homeschoolers

Gamarue malware found in UK Govt-funded laptops for homeschoolers

Shazam Vulnerability exposed location of Android, iOS users

Shazam Vulnerability exposed location of Android, iOS users

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
SonicWall hacked after 0-day flaws exploited by hackers
Hacking News

SonicWall hacked after 0-day flaws exploited by hackers

39
Massive privacy risk as hacker sold 2 million MyFreeCams user records
Cyber Crime

Massive privacy risk as hacker sold 2 million MyFreeCams user records

90
Gamarue malware found in UK Govt-funded laptops for homeschoolers
Security

Gamarue malware found in UK Govt-funded laptops for homeschoolers

427

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us