Critical infrastructure at risk again from Stuxnet-like attack

Researchers find gaping flaws in critical systems used in the most importnt industries across the globe

Hacking

A dozen vulnerabilities including previously undisclosed exploits have been discovered in software used to maintain industrial control systems (ICS) which could lead to another devastating attack on highly-prevalent critical infrastructure.

The researchers from Tenable likened the vulnerabilities to those in the family of devices affected by the infamous Stuxnet attack on an Iranian nuclear facility, adding that the software affected is used across nearly every business vertical.

Advertisement - Article continues below

The vulnerabilities affected four of the most popular ICS vendors: Siemens, Fuji Electric, Schneider Electric, and Rockwell Automation, all of which make some of the most widely used operational technologies in the world.

The researchers notified the vendors of the critical vulnerabilities and have now been patched, but they said remote malicious actors could exploit the software flaws, if left unpatched, to launch targeted attacks, perform administrative functions, unleash malicious code, harvest data or conduct espionage.

Users of the affected systems are urged to check the latest update has been applied, especially now the vulnerabilities have been disclosed.

"The attack scenario cannot be understated as critical systems such as power, water, transportation, and manufacturing all rely on major PLC vendors," said Joseph Bingham, reverse engineer at Tenable. "We will show a theoretical attack using recently discovered vulnerabilities and proof of concept code to disrupt a major power industrial system."

Advertisement
Advertisement - Article continues below

With Siemens' TIA Portal, which was patched this month, attackers could bypass HTTP authentication to gain admin privileges, enabling them to launch malicious firmware updates to modify user permissions or change proxy settings.

Advertisement - Article continues below

The Siemens vulnerability was the most dangerous of the 12 noted by the researchers, but vulnerabilities in the other systems involved remote command execution, memory corruption and stack overflows.

"A simple table with a bunch of exploits to critical vulnerabilities might not feel very impactful to many people... [but] Stuxnet only needed 3 new vulnerabilities to spread through an isolated network and damage centrifuges in the targeted Iranian nuclear facility, said Bingham. "Any of the vulnerabilities listed above could have been discovered by a threat actor and used as a key component in a targeted attack to disrupt or damage industrial hardware."

In a proof of concept exercise run by the researchers in a simulated nuclear reactor, they were able to show how just one exploited vulnerability could lead to major emergency detection systems in a plant being rendered useless, potentially causing a total nuclear meltdown.

"Attacks on critical infrastructure go well-beyond cyberspace -- they have the potential to cause physical damage and harm," said Renaud Deraison, chief technology officer and co-founder, Tenable. "And the threats to these often delicate systems cannot be overstated."

Featured Resources

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

Download now

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

Download now

All-flash buyer’s guide

Tips for evaluating Solid-State Arrays

Download now

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Download now
Advertisement

Recommended

Visit/security/355013/10-quick-tips-to-identifying-phishing-emails
Security

10 quick tips to identifying phishing emails

16 Mar 2020
Visit/business-strategy/mergers-and-acquisitions/354941/panda-security-to-be-acquired-by-watchguard
mergers and acquisitions

Panda Security to be acquired by WatchGuard

9 Mar 2020
Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/software/video-conferencing/355138/zoom-beaming-ios-user-data-to-facebook-for-targeted-ads
video conferencing

Zoom beams iOS user data to Facebook for targeted ads

27 Mar 2020
Visit/infrastructure/server-storage/355118/hpe-warns-of-critical-bug-that-destroys-ssds-after-40000-hours
Server & storage

HPE warns of 'critical' bug that destroys SSDs after 40,000 hours

26 Mar 2020
Visit/software/355113/companies-offering-free-software-to-fight-covid-19
Software

These are the companies offering free software during the coronavirus crisis

25 Mar 2020
Visit/mobile/mobile-phones/355088/apple-lifts-iphone-purchase-restrictions
Mobile Phones

Apple lifts iPhone purchase restrictions

23 Mar 2020