Lost in Translation: Serious Flaws Found in ICS Protocol GatewaysLost in Translation: Serious Flaws Found in ICS Protocol Gateways
These oft-forgotten devices contain serious vulnerabilities that allow attackers to hack OT systems remotely, researchers will reveal at Black Hat USA next month.
July 13, 2020
They are nondescript, relatively small network devices that quietly run in an industrial plant. But these low-profile ICS protocol gateways, which translate and carry traffic between older industrial networks and IP-based ones, have been found to contain some serious security flaws an attacker could use to seize control of plant processes.
Marco Balduzzi, senior research scientist with Trend Micro, next month at the Black Hat USA virtual event will disclose details of multiple vulnerabilities he and his team discovered in a sampling study of five popular ICS gateway products. Their findings focused not on the gateways' software nor the industrial protocols as in previous research, but rather on a lesser-studied function: the protocol translation process the devices conduct.
The researchers specifically tested the protocol translation process for the popular and staid Modbus serial-protocol used in automobiles and industrial plants. "We picked Modbus because it's very widely used and has been around for years," in such industries as oil and gas, electricity, and building automation, Balduzzi says. Assessing the security of ICS protocol translation breaks "new ground," he adds.
Of the five ICS gateway vendors — which Balduzzi declines to name at this time as the disclosure process unfolds — two are from the US, one from Europe, and two from Asia. The researchers created a testing system to see what holes they could find in the gateways, and there were several, including some that would allow an attacker to wage a denial-of-service attack on the device to halt a production network, local privilege escalation flaws, and a lack of encryption in their cloud interfaces so that data is sent in the clear to the cloud.
Balduzzi declines to divulge full details of the flaws before his presentation at Black Hat USA, but he confirms that many of the vulnerabilities were found across all of the products. And he believes the issues are common among many other ICS gateway products that were not tested by his team.
"The fact that you can send a command to a gateway and get it translated into something different" is significant, he says. It's a sly way for an attacker to wage an attack. "If you have a firewall in place, that firewall might see, for example, a command by the attacker and then this command gets translated into an attack vector on the back end."
He says an attacker could use this entryway to force a machine to turn off a motor in a plant process, or to trigger a phony alarm.
In the case of the DoS vulnerability, just one or a few packets can be used to bring down a device, he says, which could give an attacker leverage to demand a ransom to recover a factory's operations, for example.
But even more alarmingly, Balduzzi and his team found a collection of flaws that let an attacker obtain administrative user access remotely. An attacker also could bypass authentication altogether and log in to a device from afar, according to Balduzzi. And all of the vulnerabilities he and his team found could be exploited remotely. The catch: An attacker would need to be in the network already, via a previous infiltration from elsewhere in the network.
The challenge is getting industrial network operators to consider the security of these small and oft-forgotten devices. Balduzzi recommends taking into consideration the security of ICS products in the purchasing process. "They're not like a massive robot or big machinery doing things, like moving [machine] arms," Balduzzi notes. "But all traffic goes through these devices ... and they tend to be overlooked."
Detecting an attack on the ICS gateway isn't easy, either: A few of their firewalls weren't able to detect any attack packets sent to them during the researcher's test attacks. An IDS/IPS could help monitor for such attacks, according to Balduzzi. "Or maybe you develop your own monitoring system," he says.
The good news is that unlike inherent protocol flaws, there are ways to remediate the vulnerabilities via the firmware. "The solution is a firmware update, and most of these devices allow firmware updates," so you can do it remotely, he says.
So far, about half of the vulns have been fixed by vendors or have been remediated with a workaround.
Register now for this year's fully virtual Black Hat USA, scheduled to take place August 1–6, and get more information about the event on the Black Hat website. Click for detail on conference information and to register.
Read more about:Black Hat News
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Modernize your Security Operations with Human-Machine Intelligence
Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization
Defending Corporate Executives and VIPs from Cyberattacks