Remember Stuxnet? You'll endure its hated-by-critics sequel if you don't patch your holey Siemens industrial kit

Power, infrastructure, factory gear can be hijacked without any password check at all


Industrial control software vulnerabilities, which would be perfect for next-gen Stuxnet-style worms to exploit, are as prevalent as ever, apparently.

A report out this week from Tenable outlined a series of CVE-listed security holes in the products of four of the largest industrial control system (ICS) makers, including Siemens, whose controllers at Iranian nuclear enrichment plants were the primary target of Stuxnet.

Developed chiefly by America and Israel, Stuxnet worked by infecting Windows PCs and searching networks for computers connected to particular Siemens industrial controllers – those seemingly configured to regulate the rotor speed of gas centrifuges used by Iran – and then reprogrammed the controllers [PDF] to stealthily wreck the sensitive high-speed enrichment equipment. Specifically, Stuxnet exploited three holes in Microsoft Windows and one in Siemens's Windows-based SIMATIC software to commandeer gear in Iran's nuclear program.

It is therefore feared future strains of Stuxnet-like nasties, developed by any competent hacking operation, could potentially seize upon similar flaws still present in systems controlling important machinery and cause rather unpleasant damage.

Critical

For this latest research, Tenable engineer Joseph Bingham said he and his team examined four ICS vendors' products over a period of nine months going back to September of last year, and found a total of 17 security flaws, all but three considered to be critical. The probed equipment is used to monitor and direct all sorts of vital gear, like power station systems, factory lines, and other bits of infrastructure. It's the sort of stuff you don't want to be reprogrammed or manipulated unexpectedly from afar by miscreants.

Among those discovered holes was CVE-2019-10915, a critical bug in TIA portal, the web application Siemens provides to allow administrators to remotely send commands to installed industrial controllers. An attacker on the network can completely bypass authentication checks and fire off arbitrary commands to hijack equipment without any password needed – obviously not something you want for a critical industrial management appliance.

"An attacker can bypass HTTP authentication and access all administrator functionality by directly sending WebSocket commands to the server," Bingham explained.

"A remote attacker is able to force a malicious firmware update from an arbitrary server (resulting in remote code execution), modify user permissions, or change application proxy settings."

ics

Just a reminder: We're still bad at securing industrial controllers

READ MORE

Siemens has since issued a patch, and admins are advised to test and install the fix as soon as possible.

Though it was the most recent, the Siemens bug was far from the only critical flaw the Tenable researchers discovered. Industrial control appliances from Fuji Electric (in the Tellus V-Server), Schneider Electric (InduSoft Web Studio and Modicon PLC), and Rockwell Automation (RSLinx) were also found to contain flaws ranging from medium to critical severity.

Overall, the research paints a less than encouraging picture of the progress that the ICS and security communities have made in the nine-plus years since word first broke of Stuxnet and its exploits in sabotaging Iran's uranium centrifuges. On the other hand, software will always have bugs, and this is all software controlled, so try not to panic.

"Stuxnet only needed three new vulnerabilities to spread through an isolated network and damage centrifuges in the targeted Iranian nuclear facility," Bingham noted. "Any of the vulnerabilities… could have been discovered by a threat actor and used as a key component in a targeted attack to disrupt or damage industrial hardware." ®

Broader topics


Other stories you might like

  • Talos names eight deadly sins in widely used industrial software
    Entire swaths of gear relies on vulnerability-laden Open Automation Software (OAS)

    A researcher at Cisco's Talos threat intelligence team found eight vulnerabilities in the Open Automation Software (OAS) platform that, if exploited, could enable a bad actor to access a device and run code on a targeted system.

    The OAS platform is widely used by a range of industrial enterprises, essentially facilitating the transfer of data within an IT environment between hardware and software and playing a central role in organizations' industrial Internet of Things (IIoT) efforts. It touches a range of devices, including PLCs and OPCs and IoT devices, as well as custom applications and APIs, databases and edge systems.

    Companies like Volvo, General Dynamics, JBT Aerotech and wind-turbine maker AES are among the users of the OAS platform.

    Continue reading
  • Despite global uncertainty, $500m hit doesn't rattle Nvidia execs
    CEO acknowledges impact of war, pandemic but says fundamentals ‘are really good’

    Nvidia is expecting a $500 million hit to its global datacenter and consumer business in the second quarter due to COVID lockdowns in China and Russia's invasion of Ukraine. Despite those and other macroeconomic concerns, executives are still optimistic about future prospects.

    "The full impact and duration of the war in Ukraine and COVID lockdowns in China is difficult to predict. However, the impact of our technology and our market opportunities remain unchanged," said Jensen Huang, Nvidia's CEO and co-founder, during the company's first-quarter earnings call.

    Those two statements might sound a little contradictory, including to some investors, particularly following the stock selloff yesterday after concerns over Russia and China prompted Nvidia to issue lower-than-expected guidance for second-quarter revenue.

    Continue reading
  • Another AI supercomputer from HPE: Champollion lands in France
    That's the second in a week following similar system in Munich also aimed at researchers

    HPE is lifting the lid on a new AI supercomputer – the second this week – aimed at building and training larger machine learning models to underpin research.

    Based at HPE's Center of Excellence in Grenoble, France, the new supercomputer is to be named Champollion after the French scholar who made advances in deciphering Egyptian hieroglyphs in the 19th century. It was built in partnership with Nvidia using AMD-based Apollo computer nodes fitted with Nvidia's A100 GPUs.

    Champollion brings together HPC and purpose-built AI technologies to train machine learning models at scale and unlock results faster, HPE said. HPE already provides HPC and AI resources from its Grenoble facilities for customers, and the broader research community to access, and said it plans to provide access to Champollion for scientists and engineers globally to accelerate testing of their AI models and research.

    Continue reading

Biting the hand that feeds IT © 1998–2022