Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Infrastructure

ICS-CERT Warns of Hard Coded Password in ORing Industrial Control Systems

Attackers can remotely login to a control system used by electric utilities and oil and gas companies via a backdoor to gain administrative access, according to the Department of Homeland Security.

Attackers can remotely login to a control system used by electric utilities and oil and gas companies via a backdoor to gain administrative access, according to the Department of Homeland Security.

Taiwan-based ORing Industrial Networking products have hard-coded credentials within the operating system on its networking servers, DHS Industrial Control Systems, Cyber Emergency Response Team (ICS-CERT) said in an alert released Wednesday. The vulnerability in ORing Industrial DIN-Rail Device Server 5042/5042+ systems was found by Reid Wightman, an independent researcher working with Digital Bond, according to the alert bulletin.

ORing Vulnerability The vulnerability can be exploited remotely, and ICS-CERT said exploits targeting the system are known to be publicly available. Attackers can login to the system with administrative privileges, which means they can read and write to files and change settings, according to the alert.

Affected products are industrial serial device servers used for supervisory control and data acquisition systems, ICS-CERT said. ORing Industrial Networking devices are deployed across several sectors, including manufacturing, oil and gas, transportation, and electric utilities, and used in the United States, Europe, and Asia, according to the bulletin.

ICS-CERT released the alert because it has been “unable to successfully coordinate this vulnerability with ORing Industrial Networking because of the vendor’s unresponsiveness,” according to the bulletin.

A Common Vulnerability Scoring System base score of 10.0 has been assigned to the vulnerability, CVE 2012-4577. All versions of Industrial DIN-Rail Device Server IDS 5042 and 5042+ are affected, and it is possible other ORing Industrial Networking products may also be affected. There doesn’t appear to be an official fix to mitigate the flaw available at this time.

Organizations using affected ORing Industrial Networking products can take some “defensive measures” to protect against attackers remotely logging in, ICS-CERT said. The first step is to minimize network exposure for all control system devices. “Critical devices should not directly face the Internet,” ICS-CERT warned in the bulletin.

System networks and remote devices should be kept behind firewalls, and isolated from the business network, so that even if the attacker gets in, it’s harder to get into the business network where all the sensitive information is stored. Employees should also be reminded to use secure methods, such as Virtual Private Networks, to login remotely.

Users should also be reminded to not click on Web links or open unsolicited attachments in email messages. Of course, there is absolutely no reason why anyone should be surfing the Web or emailing on a system connected to industrial control systems.

Advertisement. Scroll to continue reading.

“Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents,” ICS-CERT wrote in the bulletin.

Related: Cyber Espionage Campaign Targets Oil Companies

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...