Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet. Locate control system networks and remote devices behind firewalls and isolate them from business networks. When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices.
Link | Providers |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-07 |
![]() ![]() |
Wed, 16 Apr 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T17:50:58.098Z
Reserved: 2022-08-04T00:00:00.000Z
Link: CVE-2022-2661

Updated: 2024-08-03T00:46:03.463Z

Status : Modified
Published: 2022-08-16T21:15:09.717
Modified: 2024-11-21T07:01:27.887
Link: CVE-2022-2661

No data.

No data.