Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Rockwell Patches Stratix Switch Flaws Introduced by Cisco Software

Updates released this week by Rockwell Automation for its Allen-Bradley Stratix industrial switches patch several denial-of-service (DoS) vulnerabilities introduced by the use of Cisco software.

Updates released this week by Rockwell Automation for its Allen-Bradley Stratix industrial switches patch several denial-of-service (DoS) vulnerabilities introduced by the use of Cisco software.

Three separate advisories were published on Thursday by ICS-CERT and Rockwell Automation (only available to registered users) to describe the impact of the flaws on Stratix 5400, 5410, 5700, 8000, 8300, 5950, and ArmorStratix 5700 switches.

One advisory describes several high-severity vulnerabilities related to the Open Shortest Path First version 3 (OSPFv3), web framework, Precision Time Protocol (PTP), IPv6 processing, and Discovery Protocol components of Cisco IOS and IOS XE.

Allen-Bradley industrial switchEach of these flaws can be exploited by a remote or adjacent attacker, without authentication, to cause affected devices to reload and enter a DoS condition by sending it specially crafted packets.

A separate advisory has been published for a medium-severity flaw in the Cisco Network Plug and Play agent. This security hole can be exploited remotely without authentication to cause a device to reload by sending invalid data to the agent.

Rockwell Automation has fixed the vulnerabilities with the release of versions 15.2(6)E2a, 15.2(6)E0a, and 15.2(4)EA7. Cisco released patches for these issues in September 2018.

Learn More About ICS Flaws at SecurityWeek’s 2019 ICS Cyber Security Conference

A third advisory has been released for a high-severity vulnerability that Rockwell has yet to patch — Cisco addressed it in September 2018. This weakness can be exploited by a remote and unauthenticated attacker to cause a device to reload by sending it malicious IPsec packets.

While this is a serious vulnerability, Rockwell has pointed out that the IPsec feature is disabled by default in its Stratix 5950 security appliance, which is affected by the flaw. The company has advised customers to avoid using any IPsec VPN connections to prevent potential attacks.

Advertisement. Scroll to continue reading.

Related: Rockwell Automation Switches Exposed to Attacks by Cisco IOS Flaws

Related: Cisco IOS Flaws Expose Rockwell Industrial Switches to Remote Attacks

Related: Rockwell Updates Stratix Routers to Patch Cisco IOS Flaws

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Discover strategies for vendor selection, integration to minimize redundancies, and maximizing ROI from your cybersecurity investments. Gain actionable insights to ensure your stack is ready for tomorrow’s challenges.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Register

People on the Move

The US arm of networking giant TP-Link has appointed Adam Robertson as Director of Information and Security.

Raj Dodhiawala has been named Chief Product Officer at Eclypsium.

Cyber exposure management firm Armis has promoted Alex Mosher to President.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.