ICM Viewer Vulnerability: Remote Code Execution Alert!
Attention all ICM Viewer users: If you don’t want your computer to start speaking in tongues, it’s time for an upgrade. A critical vulnerability in version 1.6.0.10 could let hackers do just that—execute arbitrary code. So, view CSAF recommendations and update to version 1.7.1 before your screen starts doing the cha-cha.

Hot Take:
Oh, IDIS, ICM Viewer 1.6.0.10, we hardly knew ye! Just when you thought it was safe to browse the internet, a wild vulnerability appears! This one’s so spicy, it makes jalapeños seem mild. If only hackers used their powers for good—like finding your missing socks or making vegetables taste like chocolate. But alas, they prefer turning your devices into their playgrounds. Get ready to update or uninstall faster than you can say “cybersecurity breach!”
Key Points:
- ICM Viewer Version v1.6.0.10 is vulnerable to argument injection.
- Vulnerability allows remote code execution, with a CVSS v4 score of 8.7.
- Reported by Vera Mens and Noam Moshe of Claroty Team82.
- Users should upgrade to ICM Viewer v1.7.1 or uninstall the software.
- CISA provides guidelines for minimizing exposure and improving security.
