Cisco’s Talos threat intelligence and research unit has disclosed the details of several recently patched OpenPLC vulnerabilities that can be exploited for DoS attacks and remote code execution.
OpenPLC is a fully open source programmable logic controller (PLC) that is designed to provide a low-cost industrial automation solution. It’s also advertised as ideal for conducting research.
Cisco Talos researchers informed OpenPLC developers this summer that the project is affected by five critical and high-severity vulnerabilities.
One vulnerability has been assigned a ‘critical’ severity rating. Tracked as CVE-2024-34026, it allows a remote attacker to execute arbitrary code on the targeted system using specially crafted EtherNet/IP requests.
The high-severity flaws can also be exploited using specially crafted EtherNet/IP requests, but exploitation leads to a DoS condition rather than arbitrary code execution.
However, in the case of industrial control systems (ICS), DoS vulnerabilities can have a significant impact as their exploitation could lead to the disruption of sensitive processes.
The DoS flaws are tracked as CVE-2024-36980, CVE-2024-36981, CVE-2024-39589, and CVE-2024-39590.
According to Talos, the vulnerabilities were patched on September 17. Users have been advised to update OpenPLC, but Talos has also shared information on how the DoS issues can be addressed in the source code.
Learn More at SecurityWeek’s ICS Cybersecurity Conference The leading global conference series for Operations, Control Systems and OT/IT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity. October 21-24, 2024 | Atlanta www.icscybersecurityconference.com |
Related: Automatic Tank Gauges Used in Critical Infrastructure Plagued by Critical Vulnerabilities
Related: ICS Patch Tuesday: Advisories Published by Siemens, Schneider, ABB, CISA
Related: Unpatched Vulnerabilities Expose Riello UPSs to Hacking: Security Firm