Skip to content
.ca
3 minmedium

Cyber Centre Daily Advisory Digest — 2026-05-19 (2 advisories)

The Canadian Centre for Cyber Security (CCCS) released a daily digest highlighting recent security advisories for various Industrial Control Systems (ICS) and Microsoft Edge. Organizations are advised to review the specific CISA ICS advisories for products from ABB, Siemens, and others, and to update Microsoft Edge to version 148.0.3967.70 or later.

Conf:highAnalyzed:2026-05-19Google

Authors: Canadian Centre for Cyber Security

Source:Canadian Centre for Cyber Security

Detection / HunterGoogle

What Happened

The Canadian Centre for Cyber Security issued a daily digest summarizing recent security alerts. The alerts cover vulnerabilities in several industrial control systems (used in manufacturing and critical infrastructure) from vendors like ABB and Siemens, as well as a security update for the Microsoft Edge web browser. If left unpatched, these vulnerabilities could potentially be exploited by attackers. Organizations using these products should review the specific advisories and apply the necessary software updates immediately.

Key Takeaways

  • CCCS published a daily digest covering CISA ICS advisories and a Microsoft Edge security update.
  • Multiple ICS products from ABB, Fuji Electric, Siemens, Subnet Solutions, and Universal Robots require updates to address vulnerabilities.
  • Microsoft Edge Stable Channel requires an update to version 148.0.3967.70 or later to patch security flaws.

Affected Systems

  • ABB AC500 V3
  • ABB Automation Builder Gateway
  • ABB WebPro SNMP Card PowerValue
  • Fuji Electric Tellus
  • Siemens Industrial Devices
  • Siemens Opcenter RDnL
  • Siemens Ruggedcom Rox
  • Siemens SENTRON
  • Siemens SIMATIC
  • Siemens SIPROTEC 5
  • Siemens ROS#
  • Siemens Simcenter Femap
  • Siemens Solid Edge
  • Siemens Teamcenter
  • Siemens gWAP
  • Subnet Solutions PowerSYSTEM Center
  • Universal Robots Polyscope 5
  • Microsoft Edge Stable Channel

Detection Availability

  • YARA Rules: No
  • Sigma Rules: No
  • Snort/Suricata Rules: No
  • KQL Queries: No
  • Splunk SPL Queries: No
  • EQL Queries: No
  • Other Detection Logic: No

N/A

Detection Engineering Assessment

EDR Visibility: None — The article is a vulnerability digest and does not describe specific threat behaviors or malware that an EDR would detect. Network Visibility: None — No network indicators or attack patterns are provided in the advisory digest. Detection Difficulty: Hard — Without specific CVE details, IOCs, or behavioral indicators, detection relies entirely on vulnerability scanning and patch management rather than active threat detection.

Control Gaps

  • Vulnerability Management
  • Patch Management

False Positive Assessment

  • Low

Recommendations

Immediate Mitigation

  • Verify against your organization's incident response runbook and team escalation paths before acting.
  • Identify any deployed instances of the listed ICS products (ABB, Siemens, Fuji Electric, Subnet Solutions, Universal Robots) and review the corresponding CISA advisories for specific patching instructions.
  • Update Microsoft Edge Stable Channel to version 148.0.3967.70 or later across all endpoints.

Infrastructure Hardening

  • Ensure ICS devices are not directly exposed to the internet and are properly segmented from corporate networks.
  • Implement strict access controls and monitor remote access to ICS environments.

User Protection

  • Ensure automated browser updates are enabled for Microsoft Edge to quickly deploy security patches.

Security Awareness

  • Remind administrators of the importance of timely patching for both IT (browsers) and OT (ICS) environments.