Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
Ricon Mobile has not responded to requests to work with CISA to mitigate this vulnerability. Users of the affected products are invited to contact Ricon Mobile customer support for additional information. CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should: Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet. Locate control system networks and remote devices behind firewalls and isolate them from the business network. When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices.
Link | Providers |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-032-01 |
![]() ![]() |
Wed, 16 Apr 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T16:46:22.522Z
Reserved: 2022-01-25T00:00:00.000Z
Link: CVE-2022-0365

Updated: 2024-08-02T23:25:40.208Z

Status : Modified
Published: 2022-02-04T23:15:12.563
Modified: 2024-11-21T06:38:28.067
Link: CVE-2022-0365

No data.

No data.