iTnews

Researcher creates tools to switch off PLCs

By Darren Pauli, SC Magazine on Nov 5, 2012 12:33PM
Researcher creates tools to switch off PLCs

System runs online without authentication.

A researcher has revealed dangerous holes in a supervisory control and data acquisition (SCADA) system used by some 261 manufacturers including Bosch, CAT and Mitsubishi Electric Europe.

By taking advantage of an absence of authentication and tendency to run the Codesys ladder logic runtime engine as root, an attacker could wipe memory from a Programmable Logic Controller (PLC) running the platform, start and stop the ladder logic and peruse files and directories.

They could also use in-built functions to send and receive files and, via a directory traversal flaw, could read and write files outside of the Codesys system.

"On most operating systems this includes the ability to overwrite critical configuration files such as /etc/passwd and /etc/shadow on linux, or the windows registry on Windows CE," Digital Bond researcher Reid Wightman wrote.

The affected functions within the runtime engine included a TCP file transfer service and command line interface that Wightman found did not require authentication. 

The Codesys runtime engine was also vulnerable because its design ensured it was typically run as root or on operating systems with poor security controls.

Wightman demonstrated the flaws on a WAGO embedded computer PLC, but said the attacks would likely work on all Codesys PLC makes and models. 

He said the only security offered by the Codesys platform were checks which tested if it was communicating with the correct PLC.

Wightman and a colleague released a pair of Python tools to interact with PLCs running the vulnerable Codesys platform.

Both tools, including a command shell utility that grants privileges to unauthenticated attackers, could be ported to Metasploit.

"It is the equivalent of running the PLC browser function from the Codesys desktop software, but does not assert vendor checks normally performed by the Codesys software — Codesys will normally fail to connect to a PLC and offer this option without properly licensed plugins," Wightman said.

Wightman also released a file transfer tool for reading and writing files on controllers with a filesystem.  

The creators of Codesys 3S Software Gmbh did not respond to requests for comment by the time of publication.

Got a news tip for our journalists? Share it with us anonymously here.

Copyright © SC Magazine, Australia

Tags:
digital bond plc python research scada security vulnerabilities

Partner Content

MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics
Partner Content MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics
MSI launches innovative new laptops
Partner Content MSI launches innovative new laptops
Improving returns from SD-WAN spending
Sponsored Content Improving returns from SD-WAN spending
NCS expands into Australia in partnership with Optus Enterprise
Sponsored Content NCS expands into Australia in partnership with Optus Enterprise

Sponsored Whitepapers

The risky business of open source
The risky business of open source
Mitigating open source risk in your organisation
Mitigating open source risk in your organisation
How to choose a WAF that's right for you
How to choose a WAF that's right for you
The global telco 5G cloud gaming opportunity
The global telco 5G cloud gaming opportunity
Building a ransomware remediation backup strategy
Building a ransomware remediation backup strategy

Events

  • On-Demand Webinar: How Poly and Microsoft are Embracing Future Work Environments
By Darren Pauli, SC Magazine
Nov 5 2012
12:33PM
0 Comments

Related Articles

  • 'Mercenary' hacker group runs rampant in Middle East
  • UNSW IoT cyber spin-off gets $1.3m boost
  • Security overhaul underpins Navitas' new digital campus
  • Cisco servers compromised using SaltStack flaws
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Telstra pilots its first neurodiversity recruitment program

Telstra pilots its first neurodiversity recruitment program

Update Chrome or risk remote takeover, US govt warns

Update Chrome or risk remote takeover, US govt warns

Accellion hack behind Reserve Bank of NZ data breach

Accellion hack behind Reserve Bank of NZ data breach

Google unravels state-of-art Android and Windows exploit chains

Google unravels state-of-art Android and Windows exploit chains

You must be a registered member of iTnews to post a comment.
Log In | Register
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.