ero

ETSI launches remote Plugtests Programme for Mission Critical Services to accelerate adoption and interoperability

ETSI launches remote PlugtestsTM Programme for Mission Critical Services to accelerate adoption and interoperability

Sophia Antipolis, 28 April 2020

To accelerate Mission Critical Services (MCS) adoption and interoperability, a key enabler to MCS deployment, ETSI is running an innovative MCX PlugtestsTM Programme. Testing sessions will also benefit from the latest ETSI specification, ETSI TS 103 564, on Plugtests scenarios for Mission Critical Services.

Read More...




ero

Second ETSI C-V2X interoperability test event to connect vehicles in Europe and in the rest of the world

Second ETSI C-V2X interoperability test event, remote, to connect vehicles in Europe and in the rest of the world

Register now for this remote event!

Sophia Antipolis, 5 May 2020

ETSI, in partnership with the 5GAA, is organizing the second “Cellular-Vehicle-to-Everything” (C-V2X) PlugtestsTM event. It will be held remotely, from 20 to 31 July 2020. ETSI has recently setup a remote lab for all participants, it leverages the ETSI Hub for Interoperability and Validation (HIVE) to interconnect participants’ labs and allow for multi-party interoperability testing.

Read More...




ero

ETSI’s new group on COVID-19 tracing apps interoperability moving fast: officials elected and work programme set up

ETSI’s new group on COVID-19 tracing apps interoperability moving fast: officials elected and work programme set up

Sophia Antipolis, 11 June 2020

The ETSI E4P group, “Europe for Privacy-Preserving Pandemic Protection”, launched a month ago has already held two meetings. The work of ISG E4P aims to facilitate the development of backward-compatible and interoperable proximity tracing applications to be used to combat pandemics by helping to break viral transmission chains.

Read More...




ero

ETSI C-V2X Plugtest achieves interoperability success rate of 94%

ETSI C-V2X Plugtest achieves interoperability success rate of 94%

Sophia Antipolis, 18 August 2020

ETSI has just released the report of its 2nd C-V2X Plugtests event organized remotely in partnership with the 5GAA the last week of July. The 81 remote participants benefited from ETSI’s remote lab to run their sessions in their own labs. Observers from different organizations witnessed the execution of 288 test sessions based on the ETSI test specification ETSI TS 103 600, and interoperability results were reported in the Test reporting tool. An overall interoperability success rate of 94% was achieved.

Read More...




ero

ETSI unveils NFV&MEC 2020 Interoperability Report: Strong focus on Containerized and 5G Network Services

ETSI unveils NFV&MEC 2020 Interoperability Report:
Strong focus on Containerized and 5G Network Services

Sophia Antipolis, 22 September 2020

ETSI is pleased to release the report of its NFV&MEC PlugtestsTM  event that took place remotely in June 2020. After several weeks of remote integration and pre-testing, the event offered NFV and MEC solution providers as well as open source communities an opportunity to discuss and solve interoperability challenges while validating their implementation of NFV and MEC specifications and APIs.

Read More...




ero

ETSI Mission Critical Plugtests event achieves a 95% interoperability success rate

ETSI Mission Critical Plugtests event achieves a 95% interoperability success rate

Sophia Antipolis, 2 November 2020

ETSI is pleased to announce it has now released the Report of its fifth MCX PlugtestsTM remote event that took place from 21 September to 2 October 2020. Results of the testing sessions outline an interoperability rate of 95%, giving industry a reliable set of standards for successful implementations.

Highlights of this event included initial railway-oriented capabilities in 3GPP Release-15, such as functional aliases, multi-talker, helping Future Railway Mobile Communication System (FRMCS) move forward. 173 delegates from all over the world executed around 1350 test cases in 169 test sessions, interoperability results were reported in the ETSI Test reporting tool. Around fifty new test cases were developed for this event and will be added to ETSI TS 103 564.

Read More...




ero

Open Source MANO Release NINE fulfils ETSI's zero-touch automation vision, ready for MEC and O-RAN use cases

Open Source MANO Release NINE fulfils ETSI's zero-touch automation vision, ready for MEC and O-RAN use cases

Sophia Antipolis, 18 December 2020

ETSI is pleased to announce the launch of OSM Release NINE today. With an array of new features, this Release completes the alignment process with ETSI NFV specifications, culminating in native adoption of ETSI GS NFV-SOL006 for network functions and service modelling. Standardizing the onboarding process for VNFs into OSM fosters interoperability and boosts the growth of OSM’s VNF ecosystem. Release NINE coincides with the announcement of a new production deployment, confirming OSM as the most comprehensive open-source NFV orchestrator and a key enabler for zero-touch end-to-end network and service automation.

Read More...




ero

ETSI unveils its Report comparing worldwide COVID-19 contact-tracing systems – a first step toward interoperability

ETSI unveils its Report comparing worldwide COVID-19 contact-tracing systems – a first step toward interoperability

Sophia Antipolis, 2 February 2021

The COVID-19 pandemic has stretched the planet’s health systems to their limits and tested the measures adopted to alleviate difficulties. Contact tracking or tracing to identify infected people has been one such example. However, contact tracing based on interviews with identified or suspected patients presents known weaknesses from previous pandemics. Turning to digital means in a world where global mobility is the rule was therefore of the essence.

Read More...




ero

ETSI announces first interoperability event for future railway communication

ETSI announces first interoperability event for future railway communication

Sophia Antipolis, 19 April 2021

ETSI has announced that its Future Railway Mobile Communication System (FRMCS) Plugtests™ event will take place from 14 to 18 June 2021. Over 20 vendors and more than 80 participants will participate.

Read More...




ero

ETSI C-V2X Plugtests event achieves a 93% interoperability success rate

ETSI C-V2X Plugtests event achieves a 93% interoperability success rate

Sophia Antipolis, 21 April 2022

The 3rd ETSI C-V2X PlugtestsTM event, held in partnership with 5GAA and hosted by DEKRA from 28 March to 1st April, achieved a success rate of 93% of the executed tests, showing an extremely positive level of multi-vendor interoperability. 226 test scenarios were executed in a laboratory and outdoor environment for interoperability, with 80 people from 25 companies participating in onsite and remote testing. All results are available in the newly released Report.

Read More...




ero

ETSI holds successful SDN NETCONF Plugtests interoperability event

Testing end-to-end service configuration of Millimetre Wave network devices in a Software Defined network using NETCONF

Sophia Antipolis, 8 March 2023

ETSI has organized the fourth millimetre Wave Transmission (mWT) Software Defined Networking (SDN) Plugtests™ event from 20 to 24 February 2023. The event took place at the ETSI headquarters, in Sophia Antipolis, France.

Read More...




ero

ETSI Future Railway Mobile Communication System interoperability testing event starting today

Sophia Antipolis, 3 July 2023

ETSI is starting today its 3rd FRMCS (Future Railway Mobile Communication System) Plugtests™ event. GSM-R is one of the main standards for railway telecommunication services. It is developed and maintained by the ETSI Technical Committee Railway Telecommunications. With the increased need for more throughput, higher capacity and flexible deployment options, FRMCS is being developed based on 3GPP Mission Critical Services.

Read More...




ero

ETSI interop event for future rail communication reports a success rate of 86%

Sophia Antipolis, 1 September 2023

The Report of the 3rd interoperability Plugtests™ event for the Future Railway Mobile Communication System (FRMCS) is now available. All executed tests achieved an interoperability success rate of 86%.

Read More...




ero

ETSI’s Zero-touch network Service Management group renewed for two years

Sophia Antipolis, 5 October 2023

ETSI is pleased to announce the extension of its Zero touch network and Service Management group (ISG ZSM) for an additional 2 year-period.

Read More...




ero

ETSI and 5GAA driving interoperability as C-V2X tests hit a 94% success rate

Sophia Antipolis, 30 September 2024

Direct communications between vehicles, pedestrians and infrastructure based on 3GPP and ETSI TC ITS standards have been tested during the 4th C-V2X Plugtests™ interoperability event in Malaga, Spain, hosted by DEKRA (September 10- 13, 2024).

In partnership with 5GAA, this Cellular Vehicle-to-Everything (C-V2X) and ITS technologies event attracted the participation of 24 companies and 82 experts – both onsite and via remote connections – with 94% of the planned tests, based on over 60 test scenarios, successfully completed.

Read More...




ero

CVE-2024-47575: Frequently Asked Questions About FortiJump Zero-Day in FortiManager and FortiManager Cloud

Frequently asked questions about a zero-day vulnerability in Fortinet’s FortiManager that has reportedly been exploited in the wild.

Background

The Tenable Security Response Team (SRT) has compiled this blog to answer Frequently Asked Questions (FAQ) regarding a zero-day vulnerability in Fortinet’s FortiManager.

Update October 23: The blog has been updated with new information about in-the-wild exploitation and threat actor activity associated with this vulnerability.

View Change Log

FAQ

What is FortiJump?

FortiJump is a name given to a zero-day vulnerability in the FortiGate-FortiManager (FGFM) protocol in Fortinet’s FortiManager and FortiManager Cloud. It was named by security researcher Kevin Beaumont in a blog post on October 22. Beaumont also created a logo for FortiJump.

What are the vulnerabilities associated with FortiJump?

On October 23, Fortinet published an advisory (FG-IR-24-423) for FortiJump, assigning a CVE identifier for the flaw.

CVEDescriptionCVSSv3
CVE-2024-47575FortiManager Missing authentication in fgfmsd Vulnerability9.8

What is CVE-2024-47575?

CVE-2024-47575 is a missing authentication vulnerability in the FortiGate to FortiManager (FGFM) daemon (fgfmsd) in FortiManager and FortiManager Cloud.

How severe is CVE-2024-47575?

Exploitation of FortiJump could allow an unauthenticated, remote attacker using a valid FortiGate certificate to register unauthorized devices in FortiManager. Successful exploitation would grant the attacker the ability to view and modify files, such as configuration files, to obtain sensitive information, as well as the ability to manage other devices.

Obtaining a certificate from a FortiGate device is relatively easy:

Comment
by from discussion
infortinet

 

According to results from Shodan, there are nearly 60,000 FortiManager devices that are internet-facing, including over 13,000 in the United States, over 5,800 in China, nearly 3,000 in Brazil and 2,300 in India:

When was FortiJump first disclosed?

There were reports on Reddit that Fortinet proactively notified customers using FortiManager about the flaw ahead of the release of patches, though some customers say they never received any notifications. Beaumont posted a warning to Mastodon on October 13:

 

Was this exploited as a zero-day?

Yes, according to both Beaumont and Fortinet, FortiJump has been exploited in the wild as a zero-day. Additionally, Google Mandiant published a blog post on October 23 highlighting its collaborative investigation with Fortinet into the “mass exploitation” of this zero-day vulnerability. According to Google Mandiant, they’ve discovered over 50 plus “potentially compromised FortiManager devices in various industries.”

Which threat actors are exploiting FortiJump?

Google Mandiant attributed exploitation activity to a new threat cluster called UNC5820, adding that the cluster has been observed exploiting the flaw since “as early as June 27, 2024.”

Is there a proof-of-concept (PoC) available for this vulnerability/these vulnerabilities?

As of October 23, there are no public proof-of-concept exploits available for FortiJump.

Are patches or mitigations available for FortiJump?

The following table contains a list of affected products, versions and fixed versions.

Affected ProductAffected VersionsFixed Version
FortiManager 6.26.2.0 through 6.2.12Upgrade to 6.2.13 or above
FortiManager 6.46.4.0 through 6.4.14Upgrade to 6.4.15 or above
FortiManager 7.07.0.0 through 7.0.12Upgrade to 7.0.13 or above
FortiManager 7.27.2.0 through 7.2.7Upgrade to 7.2.8 or above
FortiManager 7.47.4.0 through 7.4.4Upgrade to 7.4.5 or above
FortiManager 7.67.6.0Upgrade to 7.6.1 or above
FortiManager Cloud 6.46.4 all versionsMigrate to a fixed release
FortiManager Cloud 7.07.0.1 through 7.0.12Upgrade to 7.0.13 or above
FortiManager Cloud 7.27.2.1 through 7.2.7Upgrade to 7.2.8 or above
FortiManager Cloud 7.47.4.1 through 7.4.4Upgrade to 7.4.5 or above
FortiManager Cloud 7.6Not affectedNot Applicable

Fortinet’s advisory provides workarounds for specific impacted versions if patching is not feasible. These include blocking unknown devices from attempting to register to FortiManager, creating IP allow lists of approved FortiGate devices that can connect to FortiManager and the creation of custom certificates. Generally speaking, it is advised to ensure FGFM is not internet-facing.

Has Tenable released any product coverage for these vulnerabilities?

A list of Tenable plugins for this vulnerability can be found on the individual CVE page for CVE-2024-47575 as they’re released. This link will display all available plugins for this vulnerability, including upcoming plugins in our Plugins Pipeline.

Get more information

Change Log

Update October 23: The blog has been updated with new information about in-the-wild exploitation and threat actor activity associated with this vulnerability.

Join Tenable's Security Response Team on the Tenable Community.
Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.




ero

Cybersecurity Snapshot: Apply Zero Trust to Critical Infrastructure’s OT/ICS, CSA Advises, as Five Eyes Spotlight Tech Startups’ Security

Should critical infrastructure orgs boost OT/ICS systems’ security with zero trust? Absolutely, the CSA says. Meanwhile, the Five Eyes countries offer cyber advice to tech startups. Plus, a survey finds “shadow AI” weakening data governance. And get the latest on MFA methods, CISO trends and Uncle Sam’s AI strategy.

Dive into six things that are top of mind for the week ending Nov. 1.

1 - Securing OT/ICS in critical infrastructure with zero trust

As their operational technology (OT) computing environments become more digitized, converged with IT systems and cloud-based, critical infrastructure organizations should beef up their cybersecurity by adopting zero trust principles.

That’s the key message of the Cloud Security Alliance’s “Zero Trust Guidance for Critical Infrastructure,” which focuses on applying zero trust methods to OT and industrial control system (ICS) systems.

While OT/ICS environments were historically air gapped, that’s rarely the case anymore. “Modern systems are often interconnected via embedded wireless access, cloud and other internet-connected services, and software-as-a-service (SaaS) applications,” reads the 64-page white paper, which was published this week.

The CSA hopes the document will help cybersecurity teams and OT/ICS operators enhance the way they communicate and collaborate.

 

 

Among the topics covered are:

  • Critical infrastructure’s unique threat vectors
  • The convergence of IT/OT with digital transformation
  • Architecture and technology differences between OT and IT

The guide also outlines this five-step process for implementing zero trust in OT/ICS environments:

  • Define the surface to be protected
  • Map operational flows
  • Build a zero trust architecture
  • Draft a zero trust policy
  • Monitor and maintain the environment

A zero trust strategy boosts the security of critical OT/ICS systems by helping teams “keep pace with rapid technological advancements and the evolving threat landscape,” Jennifer Minella, the paper’s lead author, said in a statement.

To get more details, read:

For more information about OT systems cybersecurity, check out these Tenable resources: 

2 - Five Eyes publish cyber guidance for tech startups

Startup tech companies can be attractive targets for hackers, especially if they have weak cybersecurity and valuable intellectual property (IP).

To help startups prevent cyberattacks, the Five Eyes countries this week published cybersecurity guides tailored for these companies and their investors.

“This guidance is designed to help tech startups protect their innovation, reputation, and growth, while also helping tech investors fortify their portfolio companies against security risks," Mike Casey, U.S. National Counterintelligence and Security Center Director, said in a statement.

These are the top five cybersecurity recommendations from Australia, Canada, New Zealand, the U.S. and the U.K. for tech startups:

  • Be aware of threat vectors, including malicious insiders, insecure IT and supply chain risk.
  • Identify your most critical assets and conduct a risk assessment to pinpoint vulnerabilities.
  • Build security into your products by managing intellectual assets and IP; monitoring who has access to sensitive information; and ensuring this information’s protection.
  • Conduct due diligence when choosing partners and make sure they’re equipped to protect the data you share with them.
  • Before you expand abroad, prepare and become informed about these new markets by, for example, understanding local laws in areas such as IP protection and data protection.

 

 

“Sophisticated nation-state adversaries, like China, are working hard to steal the intellectual property held by some of our countries’ most innovative and exciting startups,” Ken McCallum, Director General of the U.K.’s MI5, said in a statement.

To get more details, check out these Five Eyes’ cybersecurity resources for tech startups:

3 - Survey: Unapproved AI use impacting data governance

Employees’ use of unauthorized AI tools is creating compliance issues in a majority of organizations. Specifically, it makes it harder to control data governance and compliance, according to almost 60% of organizations surveyed by market researcher Vanson Bourne.

“Amid all the investment and adoption enthusiasm, many organisations are struggling for control and visibility over its use,” reads the firm’s “AI Barometer: October 2024” publication. Vanson Bourne polls 100 IT and business executives each month about their AI investment plans.

To what extent do you think the unsanctioned use of AI tools is impacting your organisation's ability to maintain control over data governance and compliance?

(Source: Vanson Bourne’s “AI Barometer: October 2024”)

Close to half of organizations surveyed (44%) believe that at least 10% of their employees are using unapproved AI tools.

On a related front, organizations are also grappling with the issue of software vendors that unilaterally and silently add AI features to their products, especially to their SaaS applications.

While surveyed organizations say they’re reaping advantages from their AI usage, “such benefits are dependent on IT teams having the tools to address the control and visibility challenges they face,” the publication reads.

For more information about the use of unapproved AI tools, an issue also known as “shadow AI,” check out:

VIDEO

Shadow AI Risks in Your Company

 

4 - NCSC explains nuances of multi-factor authentication

Multi-factor authentication (MFA) comes in a variety of flavors, and understanding the differences is critical for choosing the right option for each use case in your organization.

To help cybersecurity teams better understand the different MFA types and their pluses and minuses, the U.K. National Cyber Security Centre (NCSC) has updated its MFA guidance.

“The new guidance explains the benefits that come with strong authentication, while also minimising the friction that some users associate with MFA,” reads an NCSC blog.

 

 

In other words, what type of MFA method to use depends on people’s roles, how they work, the devices they use, the applications or services they’re accessing and so on.

Topics covered include:

  • Recommended types of MFA, such as FIDO2 credentials, app-based and hardware-based code generators and message-based methods
  • The importance of using strong MFA to secure users’ access to sensitive data
  • The role of trusted devices in boosting and simplifying MFA
  • Bad practices that weaken MFA’s effectiveness, such as:
    • Retaining weaker, password-only authentication protocols for legacy services
    • Excluding certain accounts from MFA requirements because their users, usually high-ranking officials, find MFA inconvenient

To get more details, read:

For more information about MFA:

5 - U.S. gov’t outlines AI strategy, ties it to national security 

The White House has laid out its expectations for how the federal government ought to promote the development of AI in order to safeguard U.S. national security.

In the country’s first-ever National Security Memorandum (NSM) on AI, the Biden administration said the federal government must accomplish the following:

  • Ensure the U.S. is the leader in the development of safe, secure and trustworthy AI
  • Leverage advanced AI technologies to boost national security
  • Advance global AI consensus and governance

“The NSM’s fundamental premise is that advances at the frontier of AI will have significant implications for national security and foreign policy in the near future,” reads a White House statement.

 

 

The NSM’s directives to federal agencies include:

  • Help improve the security of chips and support the development of powerful supercomputers to be used by AI systems.
  • Help AI developers protect their work against foreign spies by providing them with cybersecurity and counterintelligence information.
  • Collaborate with international partners to create a governance framework for using AI in a way that is ethical, responsible and respects human rights. 

The White House also published a complementary document titled “Framework To Advance AI Governance and Risk Management in National Security,” which adds implementation details and guidance for the NSM.

6 - State CISOs on the frontlines of AI security

As the cybersecurity risks and benefits of AI multiply, most U.S. state CISOs find themselves at the center of their governments' efforts to craft AI security strategies and policies.

That’s according to the “2024 Deloitte-NASCIO Cybersecurity Study,” which surveyed CISOs from all 50 states and the District of Columbia.

Specifically, 88% of state CISOs reported being involved in the development of a generative AI strategy, while 96% are involved with creating a generative AI security policy.

However, their involvement in AI cybersecurity matters isn’t necessarily making them optimistic about their states’ ability to fend off AI-boosted attacks.

None said they feel “extremely confident” that their state can prevent AI-boosted attacks, while only 10% reported feeling “very confident.” The majority (43%) said they feel “somewhat confident” while the rest said they are either “not very confident” or “not confident at all.”

 

 

Naturally, most state CISOs see AI-enabled cyberthreats as significant, with 71% categorizing them as either “very high threat” (18%) or “somewhat high threat” (53%).

At the same time, state CISOs see the potential for AI to help their cybersecurity efforts, as 41% are already using generative AI for cybersecurity, and another 43% have plans to do so by mid-2025.

Other findings from the "2024 Deloitte-NASCIO Cybersecurity Study" include:

  • 4 in 10 state CISOs feel their budget is insufficient.
  • Almost half of respondents rank cybersecurity staffing as one of the top challenges.
  • In the past two years, 23 states have hired new CISOs, as the median tenure of a state CISO has dropped to 23 months, down from 30 months in 2022.
  • More state CISOs are taking on privacy protection duties — 86% are responsible for privacy protection, up from 60% two years ago.

For more information about CISO trends:




ero

SpotOn London 2012 Storify: Crowdfunded science – new opportunities or dangerous echo chamber?

Finding sources for funding research can be a demanding task, and one that's not always successful. A new trend that's emerging out of the necessity to fund projects that have no traditional means of support is "crowdfunding." A panel at SpotOnLondon weighs the resulting apprehensions and benefits.




ero

Moana : the story of the movie in comics / manuscript adaptation, Alesandro Ferrari ; layouts, Alberto Zanon, Giada Perissinotto ; pencil/inking, Veronica Di Lorenzo, Luca Bertelè ; colors, Massimo Rocca [and four others].

"Sail the Pacific Islands in search of destiny and the demigod Maui in this retelling of Disney Moana. Moana is a spirited teenager who loves the ocean, yet she is forbidden to travel beyond the reef that surrounds her island home of Motunui. But she feels called to something more, and wants to discover who she was meant to be. When darkness begins to consume the island, and nature is out of balance, Moana knows the solution lies beyond the safety of the reef. Following the messages of her ancestors, and with encouragement from the ocean itself, Moana sails into the open sea to find the demigod Maui and right a wrong from his past. Together they face rough waters, monstrous creatures, and the unknown, in a mission to stop the darkness from spreading, and restore life to the islands! Become a master wayfinder in this action-packed story as Moana's love for the sea turns her into a hero among her people, the gods, and the ocean." -- Provided by publisher




ero

Mr. littlejohn / Cameron Judd.

Two-time Spur Award nominee Cameron Judd spins Westerns that lasso listeners' attention. In this inspiring story of self-sacrifice, menacing dangers spur 17-year-old Pennington Malone to grow up quickly. With his father in Leavenworth Prison, Penn travels to Dodge City packing his dad's loaded sixgun. He soon meets Jonah Littlejohn, a lanky man gifted with incredible strength and boxing prowess-and haunted by painful secrets. But when Penn learns that three shadowy riders are trailing him-and framing him for murders they commited-he needs all the help he can get.




ero

Dear Juliet : letters from the lovestruck and lovelorn to Shakespeare's Juliet in Verona.

Every year, over 10,000 letters addressed to Juliet Capulet arrive in Verona, Italy, the famous hometown of Shakespeare's Romeo & Juliet. These handwritten letters come from people all over the world, seeking guidance and support from Juliet herself. Capturing the pain, joy, humor, and confusion of love, the 60 letters in this book offers encouragement, comfort, hope-and a nod to the human condition. Including responses from Juliet herself, this romantic and relatable, and perfect as a Valentine's Day gift, Dear Juliet proves that love is the universal language.




ero

Investir dans la formation professionnelle des jeunes: Programme de formation professionnelle des secteurs agropastoral et halieutique du Cameroun

L’investissement dans les agriculteurs, c’est-à-dire le capital humain de l’agriculture, est crucial pour relever les défis que posent nos systèmes agroalimentaires.




ero

Cool career spotlight: a day in the life of an aerospace engineer (November 13, 2024 1:00pm)

Event Begins: Wednesday, November 13, 2024 1:00pm
Location:
Organized By: University Career Center


Interested in gaining a first hand account of a career in aerospace engineering? Join Handshake and Pratt & Whitney Production Test Engineer, Anthony Bartolotta, for answers to questions on topics like:
An average day in the life of an aerospace engineer 
Important hard and soft skills for aspiring engineers to know
Tips for launching a career in engineering
Sign up for free today! 





ero

Pink Line Rerouted to Connect to Racine Blue Line Station (Planned Work w/Reroute)

(Fri, Nov 15 2024 10:00 PM to Sat, Nov 16 2024 4:00 AM) Pink Line trains will operate between 54th/Cermak and Polk, then to Racine Blue Line for connecting Blue Line train service to/from downtown.




ero

Pink Line Rerouted to Connect to Racine Blue Line Station (Planned Work w/Reroute)

(Thu, Nov 14 2024 10:00 PM to Fri, Nov 15 2024 4:00 AM) Pink Line trains will operate between 54th/Cermak and Polk, then to Racine Blue Line for connecting Blue Line train service to/from downtown.




ero

Trains Rerouted Downtown (Planned Work w/Reroute)

(Wed, Nov 13 2024 10:00 PM to Thu, Nov 14 2024 3:45 AM) Orange Ln trns will operate counterclockwise on the Outer Loop. Board/exit Orange Ln trns on the Brown Line platform at all Loop stations.




ero

Pink Line Rerouted to Connect to Racine Blue Line Station (Planned Work w/Reroute)

(Wed, Nov 13 2024 10:00 PM to Thu, Nov 14 2024 4:00 AM) Pink Line trains will operate between 54th/Cermak and Polk, then to Racine Blue Line for connecting Blue Line train service to/from downtown.




ero

Boarding Change, Delays Between the Loop and Ashland (Planned Reroute)

(Fri, Nov 15 2024 10:00 PM to Sat, Nov 16 2024 4:00 AM) Green Line trains will operate on the same track between the Loop and Ashland, resulting in minor delays.




ero

Boarding Change, Delays Between the Loop and Ashland (Planned Reroute)

(Thu, Nov 14 2024 10:00 PM to Fri, Nov 15 2024 4:00 AM) Green Line trains will operate on the same track between the Loop and Ashland, resulting in minor delays.




ero

Boarding Change, Delays Between the Loop and Ashland (Planned Reroute)

(Wed, Nov 13 2024 10:00 PM to Thu, Nov 14 2024 4:00 AM) Green Line trains will operate on the same track between the Loop and Ashland, resulting in minor delays.




ero

Temporary Reroute (Planned Reroute)

(Mon, Nov 18 2024 9:00 AM to 3:30 PM) #56 buses will operate in both directions via Milwaukee, Western, North Avenue and Milwaukee.




ero

Temporary Reroute (Planned Reroute)

(Mon, Nov 11 2024 9:00 AM to Fri, Nov 22 2024 4:00 PM) NB #37 buses will operate via Franklin, Wacker, LaSalle and Grand, then resume their normal route on Orleans.




ero

Temporary Reroute (Planned Reroute)

(Mon, Nov 11 2024 9:00 AM to Fri, Nov 22 2024 4:00 PM) NB #125 buses will operate via Wacker and LaSalle, then resume their normal route on Ohio.




ero

Temporary Reroute (Planned Reroute)

(Wed, Oct 23 2024 12:00 PM to Fri, Nov 15 2024 5:00 PM) EB #31 buses will operate via 31st, Wallace, and 33rd, then resume their normal route on Wentworth.




ero

Temporary Reroute (Planned Reroute)

(Mon, Oct 14 2024 8:00 AM to TBD) 8am to 3pm, daily: NB #146 and #148 buses will operate via State, Wacker, and Wabash, then resume their normal route on Lake.




ero

Temporary Reroute (Planned Reroute)

(Mon, Nov 27 2023 2:00 PM to TBD) #106 buses will operate in both directions via 103rd, King Drive, 107th, Cottage Grove, and 103rd.




ero

Temporary Reroute (Planned Reroute)

(Mon, Aug 7 2023 to TBD) NB #192 buses will operate via Roosevelt, Jefferson, Monroe, and Canal, then resume their normal route on Madison. SB buses are not affected.




ero

Temporary Reroute (Planned Reroute)

(Mon, Aug 7 2023 to Sat, Dec 28 2024) EB #60 and NB #125 uses will operate via Harrison and Jefferson to Monroe. EB #60 via Monroe, Canal, then Washington. NB #125 via Monroe, Canal.




ero

Temporary Reroute (Planned Reroute)

(Mon, Aug 7 2023 to TBD) WB #124 buses will operate Madison, Clinton, ending trips on Clinton between Adams and Quincy. EB via Clinton, Van Buren, Jefferson, and Monroe, then Canal.




ero

Temporary Reroute (Planned Reroute)

(Mon, Aug 7 2023 to TBD) NB #157 buses will operate via Taylor, Jefferson, and Monroe, then resume their normal route on Canal. SB buses are not affected.




ero

#125 Temporary Northbound Reroute near Wacker/Franklin (Minor Delays / Reroute)

(Tue, Nov 12 2024 9:53 AM to TBD) Northbound 125 buses are temporarily rerouted via Wacker, LaSalle, and Illinois near Wacker/Franklin.




ero

#37 Sedgwick Temporary Northbound Reroute near Wacker/Franklin (Minor Delays / Reroute)

(Tue, Nov 12 2024 9:47 AM to TBD) Northbound #37 Sedgwick buses are temporarily rerouted via Wacker, LaSalle, Grand and Orleans due to street blockage near Wacker/Franklin.




ero

Temporary Reroute (Bus Stop Note)

(Fri, Jun 28 2024 11:00 AM to TBD) The WB #77 stop on the NW corner at Racine/Belmont will be temporarily discontinued. For WB #77 svc, board/exit at Lakewood or Seminary.




ero

Temporary Reroute (Planned Reroute)

(Wed, Nov 13 2024 8:00 AM to 5:00 PM) WB #87 buses will operate via 87th, Racine, 83rd, and Ashland, then resume their normal route on 87th.




ero

Temporary Reroute (Planned Reroute)

(Sun, May 16 2021 to TBD) 81 Lawrence buses operates in both directions via Lawrence, Ashland, Wilson, Broadway and Lawrence.




ero

Temporary Reroute (Planned Reroute)

(Mon, Aug 5 2024 9:00 AM to Mon, Dec 2 2024 5:00 PM) #75 buses will operate in both directions via 74th, Halsted, 76th, Vincennes and 75th.




ero

Temporary Reroute (Planned Reroute)

(Wed, Nov 20 2024 7:00 PM to Thu, Nov 21 2024 12:01 AM) EB #20, #60, and #124 and SB #J14 and #56 buses will operate via Washington, Clark, Monroe and Dearborn, then resume their normal route on Washington.




ero

Temporary Reroute (Planned Reroute)

(Tue, Nov 12 2024 7:30 AM to Tue, Nov 19 2024 5:00 PM) #J14 and #15 buses will operate in both directions via 100th, Yates, 95th, Colfax, 92nd, and Jeffery.




ero

Temporary Reroute (Planned Reroute)

(Sat, Jul 29 2023 5:00 AM to TBD) EB 84 buses operate via Bryn Mawr, Sheridan & Thorndale to Red Line; WB buses begin trips at Thorndale Red Ln, operate via Thorndale, B'way, Hollywood & Ridge.