Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Honeywell DCS Platform Vulnerabilities Can Facilitate Attacks on Industrial Organizations

Cybersecurity company Armis has identified several vulnerabilities in Honeywell ICS products that could expose industrial organizations to attacks.

CritIX vulnerabilities in Honeywell DCS

Cybersecurity company Armis has identified several vulnerabilities in Honeywell distributed control system (DCS) products that could be exploited in attacks aimed at industrial organizations.

Armis researchers started disclosing their findings to the industrial giant last year. They discovered a total of nine new vulnerabilities, including seven that have been assigned a ‘critical severity’ rating. 

The flaws have all been patched by Honeywell and Armis has now made its findings public. The company has dubbed the vulnerabilities ‘Crit.IX’ and they are officially tracked as CVE-2023-23585, CVE-2023-22435, CVE-2023-24474, CVE-2023-25078, CVE-2023-25178, CVE-2023-24480, CVE-2023-25948, CVE-2023-25770 and CVE-2023-26597.

The Crit.IX vulnerabilities impact several of Honeywell’s Experion DCS platforms and the associated C300 DCS controller. Affected platforms include Experion Process Knowledge System (EPKS), LX and PlantCruise. 

The impacted products are used in a wide range of sectors for orchestrating industrial operations, including agriculture, water, pharmaceutical, and nuclear plants.

Armis’ research focused on the proprietary Control Data Access (CDA) protocol that is used for communications between Experion servers and C300 controllers. 

Researchers discovered the lack of encryption and proper authentication mechanisms, allowing an attacker with network access to impersonate servers and controllers. For instance, an attack could be launched from a compromised IT, OT or IoT device on the same network as the targeted DCS. 

The Crit.IX vulnerabilities can be exploited for denial-of-service (DoS) attacks, to obtain potentially sensitive information, and for remote code execution on the controller or the server. 

Advertisement. Scroll to continue reading.

A hacker could manipulate or disrupt controllers and engineering workstations, which can result in production downtime or damage to industrial equipment. Attackers could also exploit the flaws for lateral movement within the targeted organization. 

Exploitation of the Crit.IX security holes, according to specific examples shared by Armis, can lead to the “compromise of pharmaceutical batches and chemical compounds, and the disruption of power distribution to interconnected systems downstream.” 

Armis has released a technical report describing its findings. 

This is not the first time the security firm has found vulnerabilities in ICS products. It previously discovered the ModiPwn flaws in Schneider Electric PLCs, and the Urgent/11 vulnerabilities, which impact the products of several industrial giants. 

Learn More at SecurityWeek’s ICS Cyber Security Conference
The leading global conference series for Operations, Control Systems and OT/IT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.
ICS Cybersecurity Conference
October 23-26, 2023 | Atlanta
www.icscybersecurityconference.com

Related: APT Exploit Targeting Rockwell Automation Flaws Threatens Critical Infrastructure

Related: Millions of APC Smart UPS Devices Can Be Remotely Hacked, Damaged

Related: Flaws in Pneumatic Tube System Can Facilitate Cyberattacks on North American Hospitals

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Google spinoff SandboxAQ has hired Chris Bates as its first CISO.

HackerOne CEO Marten Mickos announced that he will be retiring from the company after nine years.

Lou Serlenga has joined Bitsight as Chief Revenue Officer (CRO), following leadership roles at Tenable, Nile, and HPE.

More People On The Move

Expert Insights

Related Content

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

Municipal Water Authority of Aliquippa in Pennsylvania confirms that hackers took control of a booster station, but says no risk to drinking water or...

ICS/OT

Mandiant's Chief analyst urges critical infrastructure defenders to work on finding and removing traces of Volt Typhoon, a Chinese government-backed hacking team caught in...

Cybercrime

Energy giants Schneider Electric and Siemens Energy confirm being targeted by the Cl0p ransomware group in the campaign exploiting a MOVEit zero-day.

ICS/OT

As smart cities evolve with more and more integrated connected services, cybersecurity concerns will increase dramatically.

ICS/OT

Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).