Industrial control systems: Attacks on critical infrastructures possible
Important security updates have been released for industrial control systems from Rockwell and Schneider, among others.
(Image: Steve Buissinne, gemeinfrei)
Attackers can target several security vulnerabilities in industrial control systems (ICS) used worldwide and thus attack critical infrastructures, for example. In doing so, they can gain unauthorized access and compromise systems. Security patches are available.
The US Cybersecurity & Infrastructure Security Agency (CISA) warns of this in a collective report. Specifically, ICS from BD Diagnostic Solutions, B&R, Rockwell and Schneider Electric are under threat.
Attacks with serious consequences possible
Attackers can use a vulnerability (CVE-2024-8603 “high”) in B&R Automation and mapp View, for example, and exploit a weak cryptographic algorithm to make a service with a malicious function look legitimate. Version 6.1 provides a remedy, but all previous versions are said to be at risk.
Schneider Electric Power Logic is vulnerable via two vulnerabilities (CVE-2024-10497 “high”, CVE-2024-10498 “medium”). At this point, attackers can gain higher user rights remotely by sending crafted HTTPS requests. SCADAPackTM x70 is vulnerable to malicious code attacks (CVE-2024-12703 “high”). However, this requires an authenticated victim to open a prepared project file.
Videos by heise
FactoryTalk View ME from Rockwell, among others, can be attacked via a “critical” vulnerability (CVE-2024-24480). Because input is not sufficiently checked, a remote attacker can execute their code and thus completely compromise systems. The V15.0 release or the patches AID 1152331, 11552332 provide a remedy here.
So far, there have been no reports of attacks. However, admins should not hesitate too long to install the security updates.
(des)