Skip to content
Search
Agility Network Services, Inc.
I.T. Services Provided
Menu Toggle
Managed I.T. Services Provider
I.T. Security
Menu Toggle
I.T. Security Services Overview
Anti-Virus & Anti-Malware
Phishing Testing
Multi Factor Authentication
Pen Testing (applications)
Pen Testing (perimeter / firewalls)
IT Services Projects 2
I.T. Security Services Overview
Cisco Meraki Products and Licensing
PEN Testing Vulnerability and Social Engineering for Cost Form
Cylance Protect End-Point Security / On-Site MSSP Consulting
Firewalls
Firewall Pen Testing Services Cost
I.T. Network Security Services
I.T. Security: Threat Solution Management & Ethical Hacking
Multi Factor Authentication
Pen Testing (applications)
Pen Testing (perimeter / firewalls)
Phishing Testing
Anti-Virus & Anti-Malware – I.T. Security
I.T. Network Security Services
Cloud Migrations
Wireless Products / Services
Menu Toggle
Wireless Installation Services In Chicago
Wireless Network Assessments
Our Extensive Wireless Experience
Cisco Meraki Wireless Management
Wireless Installation
Our Extensive Wireless Experience
Wireless Installation Services
Wireless Network Assessments
Wireless Installation
Cisco Meraki Wireless Management
I.T. Audits And I.T. Assessments
Full I.T. Outsourcing
Menu Toggle
VCIO Services & Engagements
Agility Network IT Services
Network Management Chicago
IT Services and IT Projects
Remote I.T. Management Tools
Emergency Network Support
Help Desk Services
I.T. System Management (Hourly/As-Needed)
Computer Network Outsourcing Services
Comprehensive Chicago I.T. Services
Chicago IT Services
Computer Network I.T. Assessments
Computer Network Audits
Complimentary Network Evaluation
Chicago IT Outsourcing
Schaumburg I.T. Outsoucing Services
Network Consulting General Service Delivery Overview
Our Remote Management and Monitoring Tools
Chicago IT Consulting Services
Chicago IT Company
Chicago IT Consulting Network Management
Chicago IT Consulting Services
Comprehensive Overview of Services
Network Consultant
VCIO Services & Engagements
Office 365
Menu Toggle
SharePoint Services
Migration and Management
Microsoft Office 365 Suite
Menu Toggle
Office 365 Application Suite
Additional Microsoft Office 365 Information
Word Online
Menu Toggle
Senior Network Consultant
Sharepoint Online
SharePoint Services
Skype For Business
Storage
Visio
Yammer
Microsoft Azure
Excel Online
Exchange Online
Onedrive For Business
Project
Office 365 For Ipad
Office 365 Free Trial
Purchasing
Additional Microsoft Office 365 Information
I.T. Audits
Menu Toggle
Computer Network Audits
Complimentary Network Evaluation
Business Continuity
Menu Toggle
Back Up
Fail-Over
Disaster Recovery
Systems Virtualization & Consolidation
Menu Toggle
Virtualization Overview
Hyper-V
Remote Desktop Services (RDS)
Desktop Virtualization
VMware Product Suite Services
Virtual Desktop Interface (VDI)
Hyper-V
About Agility
Menu Toggle
Who We Are
Our People Tools and Experience
Expertise Partners
Our Clients
Agility Vendor and Partner Expertise
Not Everything to Everyone
Why Agility?
Menu Toggle
Why Choose Agility
Testimonials
Expertise Partners
Reasons to Choose Agility Networks
Agility Networks Video
FAQ
Careers
Menu Toggle
Agility Careers
More About Agility Careers
Careers Overview
Network Consultant
Senior Network Consultant
Sales I.T. Executive
Join Our Team
Apply Now
Contact
Menu Toggle
Contact Information
Locations
Book Chicago IT Firm Time
Current Clients
Menu Toggle
Client Login
Client Portal
Client Resources
Service Request
Newsletter Sign Up
Newsletter Sign-up and Archive
News & Security Blog
Search
Agility Network Services, Inc.
Main Menu
CISA releases 1 Industrial Control Systems Advisory
HOME
August 25, 2022
Elle CeeDee
Cybersecurity
Cybersecurity
US-CERT
Posts navigation
← Cisco Releases Security Updates for Multiple Products
CISA Adds Ten Known Exploited Vulnerabilities to Catalog →
Schedule Demo: Managed IT
Use Our Online Scheduling Tool
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2023-28771 Zyxel Multiple Firewalls OS Command Injection Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Note: To view other newly added vulnerabilities in the catalog, click on the arrow in the “Date Added to Catalog” column—which will sort by descending dates. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information. Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria . This product is provided subject to this Notification and this Privacy & Use policy.CISAraw:1f454eb2acb90c4efe7a280575e90486 – 2023-05-31T21:56:06.000Z
Read More
→
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2023-28771 Zyxel Multiple Firewalls OS Command Injection Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Note: To view other newly added vulnerabilities in the catalog, click on the arrow in the “Date Added to Catalog” column—which will sort by descending dates. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information. Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria . This product is provided subject to this Notification and this Privacy & Use policy.CISAraw:ddb31194dfb744533ca878e167328a01 – 2023-05-31T15:36:16.000Z
Read More
→
CISA released one Industrial Control Systems (ICS) advisory on May 30, 2023. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-23-150-01 Advantech WebAccess/SCADA CISA encourages users and administrators to review the newly released ICS advisory for technical details and mitigations.CISAraw:371523216a544a231ef2c71c89a8dc30 – 2023-05-30T14:59:16.000Z
Read More
→
Home
Managed I.T. Services Provider
I.T. Security Services
Cloud Migration Services
Full I.T. Outsourcing
Microsoft O365 Suite
Microsoft Azure
Why Choose Agility
Careers
Menu Toggle
Join Our Team
Network Consultant
Contact Information
Search for: