US warns of SCADA flaws

Powered by SC Magazine
 

Nuclear plants and gas refineries at risk.

Following disclosures earlier this week about vulnerabilities in supervisory control and data acquisition software (SCADA) systems, US-CERT issued alerts for four software products that control hardware at such industrial facilities as nuclear plants and gas refineries.

On Monday, Luigi Auriemma, a 30-year-old Italian independent researcher, posted the advisories and proof-of-concepts to the Bugtraq email mailing list. 

Auriemma explained that at least 34 vulnerabilities – found in programs sold by Siemens, Iconics, 7-Technologies, Datac and Control Microsystems – allow people to monitor and control the various hardware sensors and mechanisms located in industrial environments and could enable attackers to remotely execute code and targeted attacks via buffer and heap overflows.

"The majority of the vulnerabilities lead to remote code execution with the privileges of the SCADA software, or more often, "administrator," and almost all the bugs fall in the trivial-to-exploit category," Auriemma told SCMagazineUS.com on Wednesday.

The remaining flaws allow miscreants to read remote files and, in three cases, the effect is "only" a crash, he said.

Similar bugs were responsible for disrupting operations at two nuclear facilities in Iran last summer.

Although the origin of the Stuxnet attacks have never been determined – it is widely believed to have originated in the United States or Israel – the attack on Siemens software raised the profile of the vulnerability of SCADA systems, garnering headlines across the globe.

Experts have said that much of the equipment in these systems is several years old, and security patches are often overlooked since replacing parts would disrupt operations.

The Siemens device is said to have been installed in more than 80,000 locations since 2008, Auriemma said, though Iconics Genesis appears to be the most used.

In response to Auriemma's list, the Industrial Control System Computer Emergency Response Team, part of the U.S. Department of Homeland Security, recommended that "users minimize network exposure for all control system devices."

Control system devices should not directly face the internet, according to the alerts. They should be placed behind firewalls and isolated from the business network. If remote access is required, IT should employ secure methods, such as virtual private networks (VPNs)."

However, in the case of Stuxnet, it is widely believed that the bug was introduced not via the internet but through thumb drives inserted into the system by maintenance workers making their rounds from facility to facility.

For more information on SCADA vulnerabilities, see "Life after Stuxnet," in the April issue of SC Magazine, which will be available online April 1.

This article originally appeared at scmagazineus.com

Copyright © SC Magazine, US edition


 
 
 
Top Stories
Matching databases to Linux distros
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 768

Vote