In a major red flag for the industrial cybersecurity community, three newly disclosed vulnerabilities in Microsens NMP Web+, a popular network management solution used across critical infrastructure, have revealed just how fragile many ICS environments remain. The flaws—two rated critical and one high—allow unauthenticated attackers to bypass authentication, generate forged JWTs, and execute arbitrary code, potentially enabling full system compromise with no credentials required.
Discovered by security researcher Noam Moshe, the vulnerabilities demonstrate how a combination of weak authentication mechanisms and insecure file handling can open the door to devastating attacks. While patches have now been released, some vulnerable systems remain internet-exposed, prompting urgent warnings from CISA—especially for those in the critical manufacturing sector.
In this episode, we dive into what went wrong, why these bugs are so dangerous, and how this incident reflects a deeper and systemic challenge in ICS security.
Topics covered include:
Microsens isn’t the only vendor in the spotlight—this episode sheds light on an industry-wide problem where security is often deprioritized in favor of uptime, and vendors may still use outdated design practices like hardcoded credentials or unexpired tokens.
For CISOs, OT engineers, and asset owners in manufacturing, energy, and industrial sectors, this is a critical wake-up call. Patching can’t be reactive—it must be strategic, tested, and integrated with operational priorities. Because when ICS systems go down, it’s not just data at risk—it’s the infrastructure behind national economies and physical safety.
En liten tjänst av I'm With Friends. Finns även på engelska.