Risk
12/13/2011
12:37 PM
50%
50%

DHS, FBI Give SCADA System Vulnerability Warning

Hackers have infiltrated control system environments in at least three cities this year. Yet, many control systems remain Internet-connected and at risk of remote exploitation.

10 Companies Driving Mobile Security
10 Companies Driving Mobile Security
(click image for larger view and for slideshow)
Thousands of Internet-connected industrial control systems aren't being properly protected by firewalls or strong authentication, which leaves them at risk of being exploited by attackers.

That warning arrived last week, when the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) at the Department of Homeland Security (DHS) reissued a warning, first made last year, that Internet-connected industrial control systems could be discovered using search engines such as Shodan, which find devices with embedded and active Web servers.

"ICS-CERT is tracking and has responded to multiple reports of researchers using Shodan, Every Routable IP Project (ERIPP), Google, and other search engines to discover Internet facing control systems," according to the alert. "ICS-CERT has coordinated this information with the identified control system owners and operators to notify them of their potential vulnerability to cyber intrusion and attack."

[ Crime fighters have a lot of new weapons. Read How Digital Forensics Detects Insider Theft. ]

Control systems need not be Internet-connected, but when they are--typically for remote monitoring purposes--"all too often, remote access has been configured with direct Internet access (no firewall) and/or default or weak user names and passwords," said ICS-CERT.

ICS-CERT warned that security researchers aren't the only ones able to use Shodan and its ilk. "Hackers can use these tools to easily identify exposed control systems, posing an increased risk of attack," it said. "Conversely, owners and operators can also use these same tools to audit their assets for unsecured Internet facing devices." On a related note, ICS-CERT said that it's been working with control system vendors to remove default credentials from their products, especially since so many of these credentials are mentioned in publicly accessible materials.

Vulnerabilities in the supervisory control and data acquisition (SCADA) systems used to run manufacturing environments have been in the news lately, owing to the purported hack of an Illinois water treatment facility control system. The incident involved the burnout of a water pump, which state authorities traced to a Russian attacker. But after further review, federal authorities found that the system had been remotely accessed from Russia--legitimately--by a contractor who was there on vacation, and they dismissed the episode.

The Feds' initial downplaying of the attack--which turned out to not have been an attack--led a hacker known as "pr0f" to launch an actual exploit. In particular, pr0f released evidence that he'd hacked into the programmable logic controller at a water treatment facility in South Houston, Texas. He also told Threatpost that the Siemens Simatic human machine interface (HMI) software that he exploited had been protected with only a three-character password.

Despite the prevalence of poorly secured SCADA systems, how often do they get exploited? Last month, Michael Welch, the deputy assistant director of the FBI's Cyber Division, told a London conference that hackers had recently accessed control systems in multiple cities. According to Welch, "We just had a circumstance where we had three cities, one of them a major city within the U.S., where you had several hackers that had made their way into SCADA systems within the city," reported Information Age.

Update: A spokeswoman for the FBI has disputed the accuracy of the Information Age article, saying that the quotes attributed to Welch were both inaccurate and taken out of context.

Database access controls keep information out of the wrong hands. Limit who sees what to stop leaks--accidental and otherwise. Also in the new, all-digital Dark Reading supplement: Why user provisioning isn't as simple as it sounds. Download the supplement now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-4403
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in Zen Cart 1.3.9h allow remote attackers to hijack the authentication of administrators for requests that (1) delete a product via a delete_product_confirm action to product.php or (2) disable a product via a setflag action to categories.ph...

CVE-2012-2930
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to hijack the authentication of administrators for requests that (1) add a user via an adduser action to admin/index.php or (2) conduct static PHP code injection attacks in .htusers...

CVE-2012-2932
Published: 2015-04-24
Multiple cross-site scripting (XSS) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to inject arbitrary web script or HTML via the (1) selitems[] parameter in a copy, (2) chmod, or (3) arch action to admin/index.php or (4) searchitem parameter in a search action to admin/...

CVE-2012-5451
Published: 2015-04-24
Multiple stack-based buffer overflows in HttpUtils.dll in TVMOBiLi before 2.1.0.3974 allow remote attackers to cause a denial of service (tvMobiliService service crash) via a long string in a (1) GET or (2) HEAD request to TCP port 30888.

CVE-2015-0297
Published: 2015-04-24
Red Hat JBoss Operations Network 3.3.1 does not properly restrict access to certain APIs, which allows remote attackers to execute arbitrary Java methos via the (1) ServerInvokerServlet or (2) SchedulerService or (3) cause a denial of service (disk consumption) via the ContentManager.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.