Vulnerability Advisories

This page offers a comprehensive view of vulnerabilities identified by Nozomi Networks in critical OT, ICS, and IoT environments, showcasing the deep expertise and dedication of our world-class Security Research team.

Each advisory represents our ongoing effort to enhance the protection of industrial systems, identifying emerging threats before they can be exploited. Immediate protection is available through our Threat Intelligence (TI) subscription, supporting a proactive, forward-thinking defense strategy. For more on our responsible approach, refer to the Responsible Disclosure Policy.

Vulnerability Advisories

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Date Published
CVE ID
Vendor
Product
Type
Risk
Details
No items found.
CVE ID
CVE-2025-59890
Vendor
Eaton
Product
Galileo
Date Published
November 28, 2025
Type
Relative Path Traversal (ZipSlip)
Risk Score
High
CVE ID
CVE-2025-11243
Vendor
Shelly
Product
Pro 4PM
Date Published
November 18, 2025
Type
Allocation of Resources Without Limits or Throttling
Risk Score
High
CVE ID
CVE-2025-12056
Vendor
Shelly
Product
Pro 3EM
Date Published
November 18, 2025
Type
Out-of-bounds Read
Risk Score
High
CVE ID
CVE-2025-11678
Vendor
warmcat
Product
libwebsockets
Date Published
October 10, 2025
Type
Stack-based Buffer Overflow
Risk Score
High
CVE ID
CVE-2025-11680
Vendor
warmcat
Product
libwebsockets
Date Published
October 10, 2025
Type
Out-of-bounds Write
Risk Score
Medium
CVE ID
CVE-2025-11677
Vendor
warmcat
Product
libwebsockets
Date Published
October 10, 2025
Type
Use after free
Risk Score
Medium

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your OT and IoT asset discovery, inventory, and management.