Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Flaw Allows Attackers to Modify Firmware on Rockwell PLCs

A vulnerability affecting programmable logic controllers from Rockwell Automation can be exploited by attackers to gain control of affected devices. While the security hole is not easy to address, the vendor has provided some mitigation advice.

A vulnerability affecting programmable logic controllers from Rockwell Automation can be exploited by attackers to gain control of affected devices. While the security hole is not easy to address, the vendor has provided some mitigation advice.

Researchers at Cisco Talos discovered that some Allen Bradley MicroLogix 1400 PLCs are exposed to attacks due to a flaw related to the Simple Network Management Protocol (SNMP), a network management protocol used for collecting information and configuring devices.

The problem uncovered by experts involves SNMP community strings. These community strings are similar to passwords and they allow or deny access to a device. The default community strings are usually “public,” which provides monitoring (read) capabilities, and “private,” which provides management (read/write) capabilities.

Cisco Talos researchers noticed that the Rockwell PLCs include an undocumented string named “wheel,” which provides both read and write capabilities. Attackers can abuse this string to make unauthorized changes to a device, including replace the original firmware with a malicious version.

Community strings can be changed by organizations. However, since this string is not documented, most users are likely unaware of its existence, leaving it open to abuse.

“Depending on the role of the affected PLC within an industrial control process, this could result in significant damages,” researchers warned.

The vulnerability has been assigned the identifier CVE-2016-5645 and a CVSS score of 7.3, which puts it in the high severity category. The list of affected products includes 1766-L32BWA, 1766-L32AWA, 1766-L32BXB, 1766-L32BWAA, 1766-L32AWAA and 1766-L32BXBA.

Advertisement. Scroll to continue reading.

According to Rockwell Automation, the affected products rely on this SNMP feature for firmware updates, which prevents it from removing the capability. The company has advised customers to protect themselves against potential attacks by using the RUN keyswitch setting to prevent unauthorized firmware updates and configuration changes.

Another mitigation involves disabling the SNMP service and enabling it temporarily only when firmware upgrades are performed. Users have also been advised to use firewalls and minimize the exposure of the affected devices.

Related: Learn More at the ICS Cyber Security Conference

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

Municipal Water Authority of Aliquippa in Pennsylvania confirms that hackers took control of a booster station, but says no risk to drinking water or...

ICS/OT

Mandiant's Chief analyst urges critical infrastructure defenders to work on finding and removing traces of Volt Typhoon, a Chinese government-backed hacking team caught in...

Cybercrime

Energy giants Schneider Electric and Siemens Energy confirm being targeted by the Cl0p ransomware group in the campaign exploiting a MOVEit zero-day.

ICS/OT

Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).

ICS/OT

As smart cities evolve with more and more integrated connected services, cybersecurity concerns will increase dramatically.