On November 19, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a set of six Industrial Control Systems (ICS) advisories, flagging security vulnerabilities in products from three different vendors: Schneider Electric, Shelly, and METZ CONNECT. These advisories are crucial for organizations in critical infrastructure sectors that rely on these systems for process automation and control. The alerts cover products such as SCADA software and smart power management devices. While specific CVE details were not enumerated in the summary reports, CISA strongly advises asset owners to review the detailed advisories on their website and implement the provided mitigation guidance to secure their operational technology (OT) environments against potential cyber threats.
The release consists of six separate advisories. While the source material does not provide specific CVE numbers or technical descriptions, the advisories cover a range of potential security issues common in ICS environments, such as unauthenticated access, command injection, or buffer overflows.
The vulnerabilities impact products from the following vendors:
Schneider Electric (4 advisories):
EcoStruxure Machine SCADA ExpertPro-face BLUE Open StudioPowerChute Serial ShutdownEcoStruxure advisoryShelly (1 advisory):
Shelly Pro 4PMShelly Pro 3EMMETZ CONNECT (1 advisory):
METZ CONNECT EWIO2These products are used globally in various critical infrastructure and manufacturing settings for monitoring and controlling industrial processes.
The source articles do not mention whether these vulnerabilities are being actively exploited in the wild. However, vulnerabilities in ICS/OT systems are high-value targets for nation-state actors and sophisticated cybercriminals seeking to disrupt critical infrastructure.
Exploitation of vulnerabilities in ICS environments can have severe real-world consequences, including:
Since specific vulnerabilities are not detailed, detection should focus on general anomalous behavior in OT networks.
| Type | Value | Description |
|---|---|---|
network_traffic_pattern |
Anomalous OT protocol commands |
Monitor for unusual or malformed commands within protocols like Modbus, DNP3, or S7comm, which could indicate an attempt to exploit a flaw. |
log_source |
HMI/SCADA Application Logs |
Look for unexpected user logins, configuration changes, or alarms being disabled on Human-Machine Interfaces (HMIs) or SCADA systems. |
process_name |
Anomalous process on engineering workstation |
Monitor for suspicious processes or scripts running on engineering workstations, as these are often used as pivot points into the OT network. |
network_traffic_pattern |
IT-to-OT network traffic |
Scrutinize all traffic crossing the IT/OT boundary. Any unauthorized protocols or connections are a major red flag. |
CISA urges all affected organizations to visit the official ICS advisories page for detailed mitigation steps. General best practices for ICS security include:
M1051 - Update Software).M1030 - Network Segmentation).M1026 - Privileged Account Management).Isolating the OT network from the IT network is the most critical architectural defense for ICS security.
Applying vendor-provided patches is essential, but must be done carefully after testing in a non-production environment.
Use application whitelisting on HMIs and engineering workstations to prevent unauthorized code from running.
Enforce strong password policies and avoid using shared accounts for engineers and operators.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats