Virtual Event Today: Ransomware Resilience & Recovery Summit - Login to Live Event
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

ICS Security Firm Warns of Flaws in WirelessHART Devices

Applied Risk, a company that specializes in securing industrial control systems (ICS), reported finding several serious vulnerabilities in products leveraging WirelessHART technology.

Applied Risk, a company that specializes in securing industrial control systems (ICS), reported finding several serious vulnerabilities in products leveraging WirelessHART technology.

WirelessHART is a wireless sensor networking technology that is based on the Highway Addressable Remote Transducer Protocol (HART). The technology has been developed for field devices, which are designed to control valves and breakers, collect data from sensors, and monitor industrial environments.

Since the security holes it has identified have not been patched, Applied Risk hasn’t disclosed any details. However, Jalal Bouhdada, founder and principal security consultant for Applied Risk, told SecurityWeek that they have identified several vulnerabilities in each of the products and brands they have analyzed.

Some of the vendors whose products are affected have been notified and they are currently working on addressing the issues, Bouhdada said. The expert has pointed out that some of the flaws they have found share a common attack surface.

The vulnerable devices are reportedly deployed across the world in various industries, and experts are concerned that a majority of the plants using them are unaware of the risks and an attack would likely go undetected due to the lack of active monitoring systems at this level.

“The risks this flaw pose reach far beyond financial loss. The loss of production is a significant issue for manufacturers, as are fines from customers if products aren’t delivered on time. The most serious risk, however, is the loss of life in the case of explosions, especially in hazardous environments,” Bouhdada said. “Alongside the potential impact to the environment, an attack could lead to significant reputational damage. End users and ICS suppliers must take a more proactive and thorough approach to testing – and implementing security measures to effectively tackle these threats.”

Applied Risk has leveraged its research into the security of WirelessHART products to develop a fuzzer designed to help manufacturers identify security flaws in the early stages of development. Bouhdada says the WirelessHART Fuzzer will become available sometime this year.

Last year, Applied Risk reported finding serious vulnerabilities in industrial ethernet switches from Moxa and power quality measurement products made by Germany-based Janitza Electronics.

Advertisement. Scroll to continue reading.

Applied Risk is not the only security firm to warn about the existence of vulnerabilities in HART-based field devices. Alexander Bolshev and Gleb Cherbov, researchers at Russia-based Digital Security, discovered in 2014 that a library used by many manufacturing and technology companies was plagued by a vulnerability that could be exploited to crash field devices.

The developer of the affected library, CodeWrights GmbH, released a new version to address the vulnerability, and many of the affected vendors integrated it into their products. The list of affected companies included Emerson, Honeywell, Magnetrol and Pepperl+Fuchs.

Related: Learn More at the ICS Cyber Security Conference

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

Municipal Water Authority of Aliquippa in Pennsylvania confirms that hackers took control of a booster station, but says no risk to drinking water or...

ICS/OT

Mandiant's Chief analyst urges critical infrastructure defenders to work on finding and removing traces of Volt Typhoon, a Chinese government-backed hacking team caught in...

Cybercrime

Energy giants Schneider Electric and Siemens Energy confirm being targeted by the Cl0p ransomware group in the campaign exploiting a MOVEit zero-day.

ICS/OT

Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).

ICS/OT

Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.