Virtual Event Today: Supply Chain Security Summit - Join Event In-Progress

Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Alerts Issued for Zero-Day Flaws in SCADA Systems

The Industrial Control Systems Computer Emergency Response Team (ICS-CERT) has published a total of six advisories to warn organizations about a series of Supervisory Control and Data Acquisition (SCADA) system vulnerabilities disclosed by a researcher at the recent DEFCON conference in Las Vegas.

The Industrial Control Systems Computer Emergency Response Team (ICS-CERT) has published a total of six advisories to warn organizations about a series of Supervisory Control and Data Acquisition (SCADA) system vulnerabilities disclosed by a researcher at the recent DEFCON conference in Las Vegas.

Elastica researcher Aditya K. Sood revealed on August 8 the existence of several vulnerabilities affecting SCADA systems, particularly human machine interfaces (HMI).

Sood has identified remote and local file inclusion, weak password hashing, insecure authentication, hardcoded credentials, weak crypto, cross-site request forgery (CSRF) and other types of vulnerabilities affecting web-based HMIs from companies such as Rockwell Automation, Siemens, Schneider Electric, KACO, Prisma and Moxa.

ICS-CERT has published two advisories for flaws affecting the web interfaces of Rockwell Automation 1766-L32BWAA/1766-L32BXBA and 1769-L18ER/A LOGIX5318ER programmable logic controllers (PLC) used for automation in industrial processes. According to the agency, Rockwell Automation 1769-L18ER/A and LOGIX5318ER devices are affected by a remotely exploitable cross-site scripting (XSS) vulnerability, while 1766-L32BWAA and 1766-L32BXBA controllers are affected by a remotely exploitable remote file inclusion flaw.

“Rockwell Automation is aware of these issues and we are in direct contact with ICS-CERT on these vulnerabilities. Our incident response teams are engaged and are actively determining our plans for remediation,” a Rockwell Automation spokesperson told SecurityWeek.

An advisory has also been published for KACO HMI products. The code of the client designed to allow users to control the HMI reportedly includes hardcoded passwords.

Sood also claims to have identified hardcoded credentials and local/remote file inclusion vulnerabilities in Schneider Electric Modicon M340 PLC Station P34 CPU modules. The security bugs can be exploited for remote code execution, directory traversal, and denial-of-service (DoS).

In the case of Prisma, the researcher reporter discovering that the passwords used for accessing web products are not properly protected (i.e. they are present on a web page accessible to remote users). Furthermore, a CSRF vulnerability allows a remote, unauthenticated attacker to update the configuration of affected devices.

The Moxa ioLogik E2210 Ethernet Micro RTU controller, a PC-based data acquisition and control device, is plagued by three vulnerabilities that make it easier for an attacker to gain unauthorized access to the product.

Sood did not give affected vendors the opportunity to patch the vulnerabilities before their existence was disclosed. The researcher and ICS-CERT are currently working with vendors on confirming and addressing the security holes. Sood says his DEFCON slides will not be published until the companies get a chance to release patches.

ICS‑CERT has issued alerts for the vulnerabilities in an effort to provide early notice and mitigations for reducing the risks associated with these weaknesses. ICS-CERT’s recommendations include minimizing network exposure for control systems, using a VPN when remote access is required, and placing control system networks and devices behind firewalls.

*Updated with statement from Rockwell Automation

Related: Learn More at the ICS Cyber Security Conference

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

ICS/OT

Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.

ICS/OT

Cybersecurity firm Forescout shows how various ICS vulnerabilities can be chained for an exploit that allows hackers to cause damage to a bridge.

ICS/OT

More than 1,300 ICS vulnerabilities were discovered in 2022, including nearly 1,000 that have a high or critical severity rating.

Cybersecurity Funding

Internet of Things (IoT) and Industrial IoT security provider Shield-IoT this week announced that it has closed a $7.4 million Series A funding round,...

ICS/OT

Siemens and Schneider Electric address nearly 100 vulnerabilities across several of their products with their February 2023 Patch Tuesday advisories.

ICS/OT

White hat hackers received $180,000 at Pwn2Own Miami 2023 for exploits targeting widely used ICS products.