Firewall integrations

Fortinet

Elevate the power of your Fortinet Fortigate Firewall using by adding our Intelligence.

Palo Alto

Palo Alto Firewalls can be hardened with our threat intelligence as well.

Sophos XGS

Enhance the Sophos XGS Firewall with our threat intelligence.

OPNsense

Enhance your OPNsense Firewall with our threat intelligence using the native plugin.

SIEM integrations

Splunk

Splunk is a great platform, but without the right Threat Intelligence it's just a log server. Try our threat intelligence today. 

Microsoft Sentinel

One of the most used SIEM solutions should be enriched with the right Intelligence. At Q-Feeds you're at the right place!

Other

Luckily there are many other SIEM vendors whom support 3rd party threat intelligence.

Threat Intelligence Portal

Darkweb Monitoring

Darkweb monitoring is one of our services, not only for threat intelligence but also for you most important assets.

Threat Lookup

With Threat Lookup you get full insights in our IOC database, including full MITRE ATT&K mapping.

External Attack Surface Management

A toolset to check your external facing assets exposed on the internet

Vulnerability Scanner

A comprehensive vulnerability scanner which can scan your infrastructure and web applications

Brand Protection

Protect your brand for look-a-likes and potential phishing attempts

Services

TAXII Feeds & Server Software

TAXII/STIX2.1 standard. Both in form of feeds and server software available

Implementation

Need help with implementations? No worries, we have a strong network of partners who are able to help you.

Solutions

Enrich my SIEM

Elevate the power of your SIEM solution using by adding our Intelligence.

Enrich my Firewall

Firewalls can be hardened with our threat intelligence as well.

Prevent phishing

Enhance your protection against phishing

Achieve compliancy

Achieve compliancy by correlating the best threat intelligence to your logs

Futuristic eye design with circuits and geometric shapes.

Company

About

Read here all about Q-Feeds

News and Updates

Cybersecurity news and updates about us

Publications

All of our media coverage in one place

Become a reseller

Strengthen your portfolio with our comprehensive reseller program

Partner locator

Find our certified partners here

Contact

For all your questions or inquiries

Neural network representation of a human brain

Support

My Account

Access your account and manage your licenses

Downloads & Manuals

On this page you find white papers and manuals

Knowledge base

Our knowledge base full of implementation instructions

Start for free

Start your cyber security intelligence journey here

Abstract geometric wireframe human head

Exploiting privileged file system flaws in SCADA systems: A cybersecurity alert

Jan 31, 2026 | Threat Intelligence Research

Critical Vulnerability Discovered in Iconics SCADA Software

CVE-2025-0921 exposes serious risks for users of the Iconics Suite, a widely used SCADA system. The vulnerability can lead to denial-of-service (DoS) attacks by exploiting privileged file system operations.

Palo Alto Networks recently identified CVE-2025-0921, a medium-severity vulnerability in Iconics Suite versions 10.97.2 and earlier. This vulnerability allows attackers to misuse file operations to corrupt critical binaries, compromising system integrity and availability. If misused, an attacker with non-administrative access can exploit this weakness to create a DoS condition on the affected system. The attack relies on a previous vulnerability, CVE-2024-7587, which grants excessive file permissions that allow unprivileged users to modify crucial configuration files. Specifically, the Pager Agent component of the AlarmWorX64 MMX feature set is targeted in this exploit.

To execute the attack, an attacker identifies the path for the SMS log file defined in a configuration file, creates a symbolic link to a critical system binary (e.g., cng.sys), and waits for system activity that triggers a log-write. This redirection causes the log file to overwrite the binary, rendering the system inoperable upon reboot. The exploit illustrates how seemingly low-risk vulnerabilities can lead to significant operational disruptions, particularly in critical industrial environments.

Understanding these vulnerabilities is crucial for defenders. The risk of exploitation highlights the urgent need for enhanced security measures in SCADA systems, where operational impacts can be severe. It serves as a reminder that unaddressed privilege escalation vulnerabilities can lead to serious consequences in operational technology environments.

Regular monitoring, robust access controls, and threat intelligence can aid in identifying and mitigating such vulnerabilities quickly. Deploying solutions like Palo Alto Networks OT Device Security can provide visibility and strengthen defenses around SCADA applications like Iconics Suite, reducing overall risk exposure.

Indicators of Compromise (IOCs):

  • CVE-2025-0921: Execution with unnecessary privileges in Mitsubishi Electric Iconics Digital Solutions GENESIS64
  • CVE-2024-7587: Affects GenBroker32 installer allowing excessive permissions.

Click here for the full article

Try our Intelligence today!

Streamline your security operations with a free Q-Feeds trial and see the difference.

Other articles