CISA has republicated two critical industrial control system (ICS) advisories affecting Programmable Logic Controllers (PLCs) that are deployed across Texas manufacturing, energy, and critical infrastructure SMBs. The advisories — ICSA-26-132-01 and ICSA-26-132-03 — cover severe vulnerabilities in ABB AC500 V3 and Fuji Electric Tellus PLCs that could allow remote attackers to manipulate industrial processes, steal cryptographic keys, or disrupt operations.

🚨 For Texas SMBs: If your business operates any industrial equipment, production lines, building management systems, or process control infrastructure, you need to determine immediately whether your systems use ABB AC500 V3 or Fuji Electric Tellus PLCs.

The Story in Plain English

PLCs are the "brains" of industrial equipment — the computer chips that control everything from assembly lines and conveyor systems to temperature controls in food processing plants and pressure monitoring in chemical facilities. For most Texas SMBs that use any kind of automated industrial equipment, the PLC is the system running your business.

CISA's advisory covers three specific vulnerabilities in ABB AC500 V3 PLCs (CVSS scores of 5.3 to 8.3):

The vulnerabilities also extend to Fuji Electric Tellus systems through ICSA-26-132-01. What makes these particularly concerning is that all three ABB vulnerabilities are exploitable remotely — meaning an attacker with network access to your industrial equipment can exploit them without physical access.

Why This Matters to a Texas SMB Owner

You might be thinking this is an enterprise-level concern. Let me be clear: if your business uses any automated industrial processes, this advisory is directly relevant to you.

Texas has the largest industrial base in the United States, and the vast majority of that industrial activity is conducted by small and medium businesses. From the Houston Ship Channel's chemical and petrochemical operations to Central Texas food processing, West Texas oil field operations, and Dallas-Fort Worth manufacturing corridors — PLC-controlled systems are everywhere.

Which Texas SMBs Are at Risk?

According to CISA's background information, these vulnerabilities affect the following critical infrastructure sectors:

The Cost of an Industrial Control Breach

For SMBs, the cost of an industrial control system breach is often existential:

Exploitation Risk Assessment

While CISA noted that ABB had not received reports of active exploitation at the time of the advisory's issuance, the remote exploitability of these vulnerabilities means they are actively exploitable by anyone with network access to the affected systems. The CVSS 8.3 rating on the certificate theft vulnerability (CVE-2025-41659) is particularly concerning because it means an attacker who gains low-level access can escalate to full control of the cryptographic infrastructure.

The key question for Texas SMBs is: is your industrial control network truly isolated from your business network? Many SMBs make the mistake of connecting their industrial equipment to their general network for convenience — and that connection is exactly what an attacker needs to exploit these vulnerabilities.

Compliance and Legal Implications for Texas SMBs

OSHA and Safety Implications

Manipulated industrial equipment isn't just a cybersecurity issue — it's a worker safety issue. OSHA's General Duty Clause requires employers to provide a workplace free from recognized hazards. A compromised PLC controlling pressure, temperature, or mechanical systems directly triggers this requirement.

Texas SB 2610 — Industrial SMBs Are Covered

Texas Senate Bill 2610 applies to SMBs across all industries, including those with industrial control systems. Your ICS security posture is part of your "reasonable cybersecurity practices" under the law. If you can't demonstrate adequate ICS security controls and you're breached through a known PLC vulnerability, your safe harbor position is significantly weakened.

Regulatory Cascading Impact

What CYFORi Would Do

When we see ICS advisories like this, our standard recommendation to Texas SMBs is immediate assessment and remediation:

1. Audit Your PLC Inventory

Many Texas SMBs don't have a complete inventory of their PLC infrastructure. We recommend immediately identifying all PLCs, HMIs, and SCADA systems in your facility and determining whether they use ABB AC500 V3 or Fuji Electric Tellus products. This is not a theoretical exercise — it's an immediate operational requirement.

2. Network Isolation Assessment

Verify that your industrial control network is truly isolated from your business network. CISA explicitly recommends that "process control systems are physically protected, have no direct connections to the Internet, and are separated from other networks by means of a firewall system that has a minimal number of ports exposed."

3. Patch Management for ICS

ICS patching is different from IT patching.** Industrial systems can't always be patched without production impact. We recommend working with your system integrator to develop a patching strategy that minimizes downtime while addressing the most critical vulnerabilities.

What a Texas SMB Should Do This Week

  1. Inventory your industrial control equipment — Identify all PLCs, HMIs, and SCADA systems
  2. Check vendor specifications — Determine if your equipment uses ABB AC500 V3 or Fuji Electric Tellus products
  3. Assess network isolation — Verify your ICS network is isolated from your business network
  4. Contact your system integrator — Discuss patching and upgrade options for your specific equipment
  5. Update your ICS incident response plan — Ensure your IR procedures account for industrial control system compromise

Is Your Industrial Infrastructure Protected?

CYFORi specializes in industrial control system security for Texas SMBs. We help you assess, protect, and monitor your ICS infrastructure against threats like the vulnerabilities outlined in today's CISA ICS advisories.