ICONICS is committed to providing high-quality, secure products to its customers.  To that end, ICONICS recommends that users of GENESIS32, BizViz, GENESIS64, or other ICONICS products take the following steps to mitigate security risks:

  • Use a firewall.  Place control system networks and devices behind firewalls and isolate them from the business network.
  • Restrict access to all TCP ports, such as port 38080 and 6002. If remote access is required, utilize secure methods such as Virtual Private Networks (VPNs).
  • Minimize network exposure for all control system devices. Control system devices should not directly face the Internet.
  • If you are not running the latest version of ICONICS software, install the appropriate patch files below.


A whitepaper is available for download that contains an overview, details and mitigation plan regarding buffer overflow and memory corruption vulnerabilities for ICONICS GENESIS32 and GENESIS64 Supervisory Control and Data Acquisition (SCADA) products.

Download the GENESIS64 whitepaper here for more information on GENESIS64.
Download the GENESIS32 whitepaper here for more information on GENESIS32.


To mitigate security risks, the following security patches should be applied to systems of these versions. A later version will already contain the changes from the previous version (for example, GENESIS32 version 9.5 already contains all applicable patches for 9.2, 9.1, and 8.0.). Please note that security patches for all versions from 10.97 and onward are included in each of our Critical Fixes Rollups, which require a SupportWorX plan and can be accessed by logging into the ICONICS Customer Connection Portal or ICONICS Community Portal.

64-Bit Products

10.96 Critical Fixes Rollup 1 (64-bit)
10.96 Critical Fixes Rollup 1 (32-bit)
10.95.5 Security Patches
10.95.2 Security Patches
10.5 Security Patches

32-Bit Products

9.5 Security Patches
9.4 Security Patches
9.2 Security Patches
9.1 Security Patches
8.0 Security Patches

There are no active US-CERT vulnerabilities for currently-released ICONICS products at this time.  Any known US-CERT vulnerabilities have already been addressed in the current version of ICONICS products, or with the patches above.

Looking for MC Works patches instead?

Find the latest security patches for MC Works software products.

Need more help?

We are available to assist our customers with the highest quality of service.