Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

5/24/2011
03:59 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Siemens To Issue Patches For SCADA Products 'In Next Few Weeks'

Says attacks would only affect plants without IT security systems

Siemens today said the vulnerabilities discovered recently in its SCADA products could have been used to halt its programmable logic controllers (PLCs) in a "secure stop mode" -- only if the systems were not employing any IT security.

The company issued a statement today indicating that the flaws recently discovered and reported to it by Dillon Beresford of NSS Labs aren't a physical danger as was indicated initially. "Independent research uncovered that the Siemens PLCs (Programmable Logic Controllers) entered into a secure stop mode when the gap was tested without any IT security measures. In this environment, the PLC would have stopped a manufacturing process in a controlled manner. For customers with standard IT security measures in place, there is no risk for workers or the manufacturing process," the company said in a statement in response to a press request for an interview.

But the fact that a plant floor system, such as a cooling system for a boiler,actually grinds to a halt is still unsafe, notes HD Moore, chief security officer for Rapid7 and creator of Metasploit. "There's no safe way to stop a boiler [cooling system]. This downplays the fact that a device that's keeping something safe ... still stops," he says.

Moore is currently working on modules for the Metasploit penetration-testing tool that would provide pen testers with exploits for the flaws in the Siemens products. He's under embargo and unable to discuss details of the flaws discovered by Beresford, who wrote Metasploit modules for his proof-of-concept and shared them with Moore.

Moore says these types of attacks could also extend to other vendors' SCADA systems, as well.

Patching Siemens' systems ultimately might not solve much. Moore says few users are likely to deploy the firmware updates. "It doesn't make sense to install these updates," Moore says. Patching SCADA systems isn't as simple as taking them down and slapping on the patch, and the devices are already very fragile to disruption, he says. Under NERC regulations, for example, any firmware updates require proper testing before going live. "These [systems] are more difficult to upgrade. You can't just pull them offline and then put them back up," Moore notes.

Even so, Moore confirmed Siemens' stipulation that a tight IT security setup, including a locked-down firewall and no wireless, for example, should protect plants from attacks exploiting these flaws. But, in the end, it really depends on the overall environment, he says. "If you have 3,000 unprotected oil wells on the network, it won't help much," he notes.

Rick Moy, president of NSS Labs, says his firm will demonstrate the attacks to ICS operators in its Austin, Texas, laboratory on June 2. NSS Labs is accepting applications for registration here.

NSS Labs' Beresford canceled his talk at TakedownCon 2011 in Dallas at the eleventh hour last week due to concerns about the content's possible risk to human life. He had planned to reveal vulnerabilities and proof-of-concept (PoC) exploit code for flaws in Siemens SCADA industrial-control systems products.

Meanwhile, Siemens today said it's "in direct contact with its customers on a regular basis with regard to security gaps identified in its products," that it has already built the updates for its PLCs, and is currently testing them in-house in "joint cooperation with ICS-CERT."

"We anticipate having these updates available for our customers within the next few weeks. Ongoing communication will be available at www.siemens.com/industrialsecurity," according to the company. Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-29430
PUBLISHED: 2021-04-15
Sydent is a reference Matrix identity server. Sydent does not limit the size of requests it receives from HTTP clients. A malicious user could send an HTTP request with a very large body, leading to memory exhaustion and denial of service. Sydent also does not limit response size for requests it mak...
CVE-2021-29431
PUBLISHED: 2021-04-15
Sydent is a reference Matrix identity server. Sydent can be induced to send HTTP GET requests to internal systems, due to lack of parameter validation or IP address blacklisting. It is not possible to exfiltrate data or control request headers, but it might be possible to use the attack to perform a...
CVE-2021-29432
PUBLISHED: 2021-04-15
Sydent is a reference matrix identity server. A malicious user could abuse Sydent to send out arbitrary emails from the Sydent email address. This could be used to construct plausible phishing emails, for example. This issue has been fixed in 4469d1d.
CVE-2021-29447
PUBLISHED: 2021-04-15
Wordpress is an open source CMS. A user with the ability to upload files (like an Author) can exploit an XML parsing issue in the Media Library leading to XXE attacks. This requires WordPress installation to be using PHP 8. Access to internal files is possible in a successful XXE attack. This has be...
CVE-2021-30245
PUBLISHED: 2021-04-15
The project received a report that all versions of Apache OpenOffice through 4.1.8 can open non-http(s) hyperlinks. The problem has existed since about 2006 and the issue is also in 4.1.9. If the link is specifically crafted this could lead to untrusted code execution. It is always best practice to ...