Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Over 400 ICS Vulnerabilities Disclosed in 2019: Report

More than 400 vulnerabilities affecting industrial control systems (ICS) were disclosed in 2019 and over a quarter of them had no patches when their existence was made public, according to a report published on Thursday by industrial cybersecurity firm Dragos.

More than 400 vulnerabilities affecting industrial control systems (ICS) were disclosed in 2019 and over a quarter of them had no patches when their existence was made public, according to a report published on Thursday by industrial cybersecurity firm Dragos.

Dragos analyzed 438 ICS vulnerabilities covered in 212 security advisories, roughly the same as in the previous year. Of the 116 unique types of flaws, the most common were improper input validation, stack-based buffer overflow, cross-site scripting (XSS), the use of hardcoded credentials, and uncontrolled resource consumption (i.e. DoS) issues.

According to Dragos, 77% of the advisories published last year covered vulnerabilities in systems typically located deep within a control system network. This includes engineering workstations, HMIs, operator panels, industrial network equipment, and field devices.

The company said 9% of advisories covered flaws in products that could allow an attacker to gain access from the IT network to the OT network, including data historians, OPC servers, VPNs and cross-domain applications.

Nearly three quarters of the advisories described vulnerabilities that could be exploited from the network, while the rest required local or physical access to the targeted machine.

Learn More About Vulnerabilities in Industrial Products at SecurityWeek’s 2020 ICS Cyber Security Conference

The cybersecurity firm said half of the vulnerabilities disclosed in 2019 could have led to both loss of view (i.e. inability to monitor or read the state of the system) and loss of control (i.e. inability to modify the state of the system). Forty-three percent of advisories covered flaws that could not cause either loss of view or loss of control.

Dragos found that 26% of advisories did not mention a patch when they were first published, and three quarters of these also had no practical mitigation advice.

Advertisement. Scroll to continue reading.

The company has also looked for errors in advisories and found that 30% of them contained incorrect data, which is roughly the same as in 2018. However, in 2019, only 19% of individual vulnerability descriptions contained errors, compared to 32% in 2018.

In addition to its ICS vulnerabilities report, Dragos on Thursday published two other reports describing threat groups and the landscape, and lessons learned from threat hunting and incident response. All of them are available in PDF format on Dragos’ website.

Related: Researcher Finds Over 60 Vulnerabilities in Physical Security Systems

Related: Wormable Windows RDS Vulnerability Poses Serious Risk to ICS

Related: CVSS Scores Often Misleading for ICS Vulnerabilities

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

Vulnerabilities

The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.