ICS/OT

CISA Informs Organizations of Flaws in Unsupported Industrial Telecontrol Devices

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) last week released an advisory to inform organizations about potentially serious vulnerabilities affecting ipDIO telecontrol communication devices that are no longer supported by the vendor.

<p><strong><span><span>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) last week released an advisory to inform organizations about potentially serious vulnerabilities affecting ipDIO telecontrol communication devices that are no longer supported by the vendor.</span></span></strong></p>

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) last week released an advisory to inform organizations about potentially serious vulnerabilities affecting ipDIO telecontrol communication devices that are no longer supported by the vendor.

ipDIO, made by Germany-based IPCOMM, is designed to record analog and digital inputs from switches, counters, sensors and other devices, and it supports various industrial protocols. According to CISA, the device is used by organizations worldwide.

Aarón Flecha Menéndez, an ICS security consultant at Spain-based cybersecurity firm S21sec, informed IPCOMM through CISA in August 2021 that the ipDIO product is affected by four vulnerabilities, including two high-severity code injection issues and two medium-severity persistent cross-site scripting (XSS) flaws.

The researcher told SecurityWeek that exploitation of the vulnerabilities could allow a remote attacker to take complete control of the device and cause disruption. However, exploitation requires user interaction (e.g. accessing certain sections of the web-based management interface) and in some cases access to the web interface.

In addition, the researcher has not identified any internet-exposed devices through simple searchers (e.g. Shodan, ZoomEye, FOFA) but admitted that he did not attempt to conduct searches using more advanced techniques.

The ipDIO product has reached end of life (EOL) and no longer receives updates. The vendor has advised customers to upgrade to its ip4Cloud device, which is the successor of ipDIO.

Learn more about vulnerabilities in industrial systems at SecurityWeek’s ICS Cyber Security Conference

IPCOMM told SecurityWeek that it coordinated the release of the advisory with CISA, which has also shared some general recommendations for preventing potential attacks.

The vendor said it cannot disclose information on how many customers still use the EOL device, but the researcher believes it can still be found in energy sector companies, particularly at electricity distributors in Europe.

Advertisement. Scroll to continue reading.

“Based on my experience with this and other devices for which I have reported vulnerabilities, we are often unaware of where the devices are used and the infrastructures that use them,” Flecha Menéndez explained.

Related: GE SCADA Product Vulnerabilities Show Importance of Secure Configurations

Related: Moxa MXview Vulnerabilities Expose Industrial Networks to Attacks

Related: New Vulnerabilities Can Allow Hackers to Remotely Crash Siemens PLCs

Related Content

ICS/OT

UK’s NCSC releases security guidance for OT organizations considering migrating their SCADA solutions to the cloud.

ICS/OT

In an age of increasing geopolitical tensions caused by actual wars, and the threat of Chinese action against Taiwan, OT is a target that...

ICS/OT

SecurityWeek interviews Del Rodillas, Senior Director of Product Management at Palo Alto Networks, about the integration of IT and OT in the ICS threat landscape.

ICS/OT

Seven vulnerabilities found in Rapid SCADA could be exploited to gain access to sensitive industrial systems, but they remain unpatched.

ICS/OT

The Municipal Water Authority of Aliquippa was just one of multiple organizations breached in the U.S. by Iran-linked "Cyber Av3ngers" hackers

ICS/OT

Members of Congress asked the U.S. Justice Department to investigate how foreign hackers breached a water authority near Pittsburgh, prompting CISA to warn other...

ICS/OT

SecurityWeek’s 2023 ICS Cybersecurity Conference continues in Atlanta, as hundreds of industrial cybersecurity stakeholders gather for Day 2 of the annual industrial cybersecurity conference.

ICS/OT

Join SecurityWeek and TXOne Networks for this webinar as we expose common misconceptions surrounding the security of Operational Technology (OT) and dive into the...

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version