"value":"Sewio\u2019s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 is vulnerable to cross-site request forgery in its monitor services. An attacker could take advantage of this vulnerability to execute arbitrary maintenance operations and cause a denial-of-service condition."
"value":"\n<p>Sewio also recommends the following workarounds to reduce the risk of exploitation: </p>\n\n<ul><li>Minimize network exposure for all control system devices and/or systems, and ensure they are <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01\">not accessible from the internet</a>. </li>\n\t<li>Locate control system networks and remote devices behind firewalls and isolate them from business networks. </li></ul>\n\n<br>"
}
],
"value":"Sewio also recommends the following workarounds to reduce the risk of exploitation: \n\n\n\n * Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01 . \n\n\t * Locate control system networks and remote devices behind firewalls and isolate them from business networks. \n\n\n\n\n\n"
}
],
"solution":[
{
"lang":"en",
"supportingMedia":[
{
"base64":false,
"type":"text/html",
"value":"\n<p>Sewio has provided the following updates and recommends that users update to the latest version: </p>\n\n<ul><li>RTLS Studio: Update to <a target=\"_blank\" rel=\"nofollow\" href=\"https://portal.sewio.net/login\">version 3.0.0 or later</a> (requires login)</li></ul>"
}
],
"value":"Sewio has provided the following updates and recommends that users update to the latest version: \n\n\n\n * RTLS Studio: Update to version 3.0.0 or later https://portal.sewio.net/login \u00a0(requires login)\n\n\n"