Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
Home/CyberSecurity News/CISA Warns: ZLAN ICS Flaws Allow Complete Devices Vulnerabilities
CyberSecurity News

CISA Warns: ZLAN ICS Flaws Allow Complete Devices Vulnerabilities

CISA has issued an urgent alert detailing two critical vulnerabilities found within ZLAN Information Technology Co.’s ZLAN5143D industrial communication device. According to the advisory...

Marcus Rodriguez
Marcus Rodriguez
February 16, 2026 2 Min Read
0 0

CISA has issued an urgent alert detailing two critical vulnerabilities found within ZLAN Information Technology Co.’s ZLAN5143D industrial communication device.

According to the advisory (ICSA-26-041-02), successful exploitation could allow attackers to gain complete control of affected systems by bypassing authentication mechanisms or resetting device passwords remotely.

The vulnerabilities impact ZLAN5143D version 1.600, a device commonly used across global critical manufacturing environments for industrial control and communication functions.

CISA warned that public exploitation could allow malicious actors to compromise operational technology (OT) systems and disrupt industrial operations.

Researchers Shorabh Karir and Deepak Singh from KPMG discovered the weaknesses and responsibly reported them to CISA.

CVE ID CVSS Description Vendor Product Affected Version
CVE-2026-25084 9.8 (Critical) Missing authentication enables remote device control. ZLAN Information Technology Co. ZLAN5143D 1.600
CVE-2026-24789 9.8 (Critical) Unauthorized password reset leads to full compromise. ZLAN Information Technology Co. ZLAN5143D 1.600

The flaws are characterized by missing authentication for critical functions, allowing unauthenticated attackers to access sensitive control commands directly.

Risk to Industrial Operators

Industrial operators relying on the ZLAN5143D series could face significant cybersecurity risks if these devices are exposed to the internet or integrated into inadequately segmented networks.

Because the vulnerabilities enable authentication bypass and password resets, an attacker could alter configurations, disrupt control commands, or potentially leverage the device as an entry point into wider industrial environments.

CISA said no public exploitation is known yet, but risk remains high due to widespread deployment and high CVSS scores.

CISA strongly advises organizations to isolate control networks from business IT environments and restrict all external access to ICS devices.

Recommended actions include minimizing network exposure, positioning devices behind firewalls, implementing VPNs for authorized remote access, and ensuring that all such software is kept up to date.

Before deploying defensive measures, organizations should perform a thorough impact assessment and review CISA’s industrial control systems security best practices available at cisa.gov/ics.

Additional mitigation guidance can be found in CISA’s technical information paper, ICS-TIP-12-146-01B – Targeted Cyber Intrusion Detection and Mitigation Strategies.

At present, ZLAN Information Technology Co. has not released a patch or specific update addressing these issues.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVECybersecurityExploitPatchSecurity

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Lotus Blossom Hacked Notepad++ Official Hosting Infrastructure

Next Post

ZeroDayRAT Attacks Android/iOS: Real- Attacking Real-Time

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global
May 1, 2026
Deep#Door Stealer Harvests Passwords, Cloud Browser Tokens
May 1, 2026
China-Aligned Attackers Use ShadowPad, IOX Proxy WMIC Multi-Stage
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us