Industrial Control System Features at Risk

  /     /     /  
Publicated : 23/11/2024   Category : security


Industrial Control System Features at Risk


How some ICS product functions can be weaponized by altering their configurations.



A new analysis of industrial control systems (ICS) running in the networks of oil and gas, power generation, refining and chemicals, pulp and paper, and mining industries sheds light on how some legitimate and deeply rooted product features and functions can actually threaten their security.
In many cases, these purpose-built functions embedded in systems can be exploited by malicious attackers by merely changing easily adjusted configurations and settings; malware isnt necessarily required to do so, according to Mark Carrigan, chief operating office of PAS Global. Carrigans firm studied some 10,000 of its customers ICS systems to pinpoint features that he describes as delicate by design with easily abused configuration capabilities. 
Its a spin on the well-known insecure by design issue associated with these systems: Security vulnerabilities as well as the lack of security controls in the design of many OT products have been the subject of research for some time. But Carrigan points out that some product features, too, can easily be reconfigured and weaponized.
Not only do many of these systems predate todays cyberthreats, but some of the security-challenged features were built into the systems to make engineers jobs easier and so they could perform their tasks quickly, according to Carrigan. They cant easily be updated, and even removing some of these weaknesses can, in many cases, cause a ripple effect of disruption in the system and production.
While sophisticated or potentially damaging attacks on ICS networks to date have been relatively rare and difficult to pull off without knowledge of a plants processes as well as the ICS systems within it, security experts say nation-state attackers, via cyber espionage campaigns, are increasingly gaining knowledge to sabotage a plants operation via a cyberattack. Stuxnet was the first wakeup call for the industrial sector. Most recently was Triton/Trisis, which in 2017 shut down the safety instrumentation system at a petrochemical plant in Saudi Arabia. 
Understanding the processes beneath the control systems could be a deadly combination for a malicious hacker able to change the configuration of the OT assets, Carrigan says. Thats the next landscape for attackers, he says.
Tip of the Iceberg
Carrigan wont name names of the affected vendors PAS found in its analysis, but some of the exposed features span multiple brands of OT equipment. Of the 10,000 industrial systems, there were some 380,000 total known vulnerabilities with published CVEs, most of which were Microsoft Windows-related. He will present his findings next week at the
S4x20
 ICS security conference in Miami.
This is just the tip of the iceberg. There are tons of these out there, Carrigan says.
Dale Peterson, CEO of Digital Bond, a control systems research and consulting firm that runs S4, says Carrigans study provides another level of insecure-by-design issues. Specifically, some of them include features that are required for components to communicate. To actually fix these issues would entail simultaneously upgrading a large number of components and weeks of production outage, he explains.
Also, many of these features are hidden or known only to the team deploying the ICS, Peterson notes.
Many of the security-challenged features PAS is highlighting are well-known by the vendors in question, according to Carrigan. Most of the fallout he has seen with those features so far has been with mistakes and inadvertent misconfigurations by the operators themselves, not malicious hackers.
One feature that spans all vendors control systems products is a parameter or setting generally known as the output characteristic. This control function parameter is a binary setting that determines, for example, the flow rate of air or gas in a valve. If the flow controller is set for 100 and the current flow is 80, it will open the valve to reach 100, for example, he says. If I just reverse that setting — just switch it ... its a simple thing to do — that valve opening is going to close. Ive [then] reversed the action of the output characteristic, he explains.
Another feature specific to one vendors control system product — which it recently patched — is a command in the human machine interfaces (HMI) graphics files that could allow an attacker to gain administrative control of the entire DCS network, Carrigan says. This feature is for engineers or designers to create a command for an operator, but if an attacker got hold of it, he or she could land admin privileges. It even bypasses any set Windows admin privileges, he says.
An additional feature at risk is an HTML weakness in most HMIs built in the past 10 years, according to PASs findings. These HMIs use a free format of HTML for graphics design, according to Carrigan. If you have HTML, you can inject code and do almost anything you want — change flow control settings, no problem. Do SQL injections in the configuration database, no issue there, he says.
PAS also found a setting in one vendors control system for balancing computing loads for a flow-control indicator process. By mixing up the calculations of the flow indicator and the flow controller on the CPU, an attacker could wreak havoc on the operation. Theres nothing in the system to prevent you from setting those things wrong. So at a minimum I can cause production problems by changing a bunch of these settings, or even overload the CPU, he says.
Another delicate feature they found: one vendors ICS system that uses a single, hard-coded system engineer username and password that is stored in its configuration database. The password is hashed, but Carrigan says its a very simple and guessable hash. Once Ive [the attacker] figured it out, I know for every single system, I can access that hash and access that system, he explains. The password cant be changed because its designed into the product.
Damon Small, technical director of the NCC Group, says the threat model has changed significantly for the ICS sector, and attacks are becoming more common. But the real-world impact of making security changes like patching or other moves that take operations offline even for a short period of time often deter any major security changes by operators. Small says once when he recommended an operator to patch monthly for Windows flaws, the operator told him that taking those systems offline for just four hours would cost his organization $350,000 in outage time.
Operators know very well the inefficiencies introduced when you start messing with control systems, Small explains.
What to Do
How do OT operators protect their plants from their own systems, especially if patching may be off the table in some cases?
Adopting configuration management, especially for the most critical systems and assets, is one way to thwart an attack via delicate features, according to Carrigan. That way only the changes you allow can take place, for instance, he says.
Passive network monitoring can also catch anomalous traffic and behavior, notes NCC Groups Small, who is also a founding member of the Operational Technology Cyber Security Alliance. If you see something other than what you were expecting, that could an indicator of something having gone wrong. But this assumes you understand what your normal traffic looks like — what your baseline is, he notes, which requires analysis.
Related Content:
Siemens Offers Workarounds for Newly Found PLC Vulnerability
Triton/Trisis Attacks Another Victim
Industrial Safety Systems in the Bullseye
Lessons From The Ukraine Electric Grid Hack
 
Check out 
The Edge
, Dark Readings new section for features, threat data, and in-depth perspectives. Todays top story:
6 Unique InfoSec Metrics CISOs Should Track in 2020
.

Last News

▸ Obama supports NSA Prism program, Google denies access point ◂
Discovered: 26/12/2024
Category: security

▸ Glasgow Council fined for weak security. ◂
Discovered: 26/12/2024
Category: security

▸ NSA PRISM causes controversy, yet seems lawful. ◂
Discovered: 26/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Industrial Control System Features at Risk