CISA Issues High-Risk ICS Security Advisories for March 2026

Basically, CISA warned about security holes in important control systems that need fixing.
CISA has released critical advisories for various ICS vulnerabilities. Affected systems include Grassroots DICOM and Schneider Electric products. Organizations must act quickly to implement updates and protect their infrastructure.
What Happened
Between March 23 and 29, 2026, the Cybersecurity and Infrastructure Security Agency (CISA) published a series of advisories aimed at addressing vulnerabilities in several industrial control systems (ICS). These advisories are crucial as they highlight security flaws that could potentially be exploited by malicious actors. The products affected include notable systems such as Grassroots DICOM, Pharos Controls, and various Schneider Electric offerings.
The vulnerabilities identified could allow unauthorized access or manipulation of critical infrastructure, posing significant risks to operational safety and data integrity. As these systems are integral to various sectors, including healthcare and manufacturing, the implications of these vulnerabilities are far-reaching.
Who's Affected
The advisories specifically mention vulnerabilities in the following products:
- Grassroots DICOM (GDCM) β version 3.2.2
- Pharos Controls Mosaic Show Controller β firmware version 2.15.3
- OpenCode Systems OC Messaging and USSD Gateway β version 6.32.2
- PTC Windchill Product Lifecycle Management β multiple versions and models
- Schneider Electric EcoStruxure Foxboro DCS β versions prior to CS8.1
- Schneider Electric Plant iT/Brewmaxx β version 9.60 and above
- WAGO GmbH & Co. KG Industrial Managed Switches β multiple firmware versions
Organizations utilizing these systems must prioritize reviewing the advisories to understand their exposure and take necessary actions. The failure to address these vulnerabilities could lead to severe operational disruptions and security breaches.
Patch Status
CISA encourages users and administrators of the affected systems to review the advisories and implement the suggested mitigations. This includes applying any available patches or updates to secure their systems against potential exploitation. The advisories serve as a critical reminder of the importance of maintaining up-to-date software and firmware in industrial environments.
As vulnerabilities in ICS can have catastrophic consequences, timely updates are essential. Organizations should have a robust patch management strategy in place to address these issues promptly.
Immediate Actions
To protect against the vulnerabilities outlined in the CISA advisories, organizations should take the following steps:
- Review the advisories: Understand which systems are affected and the nature of the vulnerabilities.
- Implement updates: Apply patches or updates as recommended by CISA and the respective vendors.
- Monitor systems: Keep an eye on system performance and security logs for any unusual activity.
- Educate staff: Ensure that all relevant personnel are aware of the vulnerabilities and the importance of security measures.
By taking these proactive steps, organizations can mitigate the risks associated with these vulnerabilities and enhance their overall security posture.