Westermo has created a set of five basic concepts anyone with an industrial control system can apply to improve the security posture in a sustainable way.
The five steps are:
Learn how to use WeOS to detect intrusion attempts
Use WeOS switching routers to create security zones in your network
Network to network protection
WeOS functions for protection of data in transit
Protect your industrial network from unsolicited requests
Defend your network from unauthorized devices
Fill out the simple form below and the documents will be sent to your E-mail instantly.
Westermo has extensive knowledge of industrial networks. Through our many years as a manufacturer of industrial networking products, we have learnt how to best protect your network against intrusion.
In this archive you will find regular updates on security advisories, statements, application concept and best practices. Check back often and do not hesitate to contact us if you have any questions regarding industrial cybersecurity.
|Westermo-18-04||Vulnerabilities in BusyBox||2018-05-29||Download
|Westermo-18-03||Mongoose web server vulnerabilities||2018-05-29||Download
|Westermo-18-02||WeOS Vulnerable to Cross Site Request Forgery attack||2018-05-29||Download
|Westermo-18-01||Meltdown and Spectre||2018-01-05
|WEOS-17-03||WiFi key reinstallation attack||2017-10-17
|WEOS-17-02||Multiple vulnerabilities in dnsmasq||2017-10-12||Download
|WEOS-15-08||Multiple vulnerabilities in MRD products||2017-08-14||Download|
|WEOS-17-01||MSG_PEEK second checksum||2017-05-30||Download
|WEOS-16-03||CVE-2015-7547 glibc getaddrinfo stack-based buffer overflow||2016-02-19||Download|
||Multiple vulnerabilities in OpenSSL (update 1.0.1q) v1||2015-12-04||Download|
||Default factory web interface certificate||2015-11-30||Download|
Sales, Westermo US