Siemens To Issue Patches For SCADA Products In Next Few Weeks

  /     /     /  
Publicated : 22/11/2024   Category : security


Siemens To Issue Patches For SCADA Products In Next Few Weeks


Says attacks would only affect plants without IT security systems



Siemens today said the vulnerabilities discovered recently in its SCADA products could have been used to halt its programmable logic controllers (PLCs) in a secure stop mode -- only if the systems were not employing any IT security.
The company issued a statement today indicating that
the flaws recently discovered and reported
to it by Dillon Beresford of NSS Labs arent a physical danger as was indicated initially. Independent research uncovered that the Siemens PLCs (Programmable Logic Controllers) entered into a secure stop mode when the gap was tested without any IT security measures. In this environment, the PLC would have stopped a manufacturing process in a controlled manner. For customers with standard IT security measures in place, there is no risk for workers or the manufacturing process, the company said in a statement in response to a press request for an interview.
But the fact that a plant floor system, such as a cooling system for a boiler,actually grinds to a halt is still unsafe, notes HD Moore, chief security officer for Rapid7 and creator of Metasploit. Theres no safe way to stop a boiler [cooling system]. This downplays the fact that a device thats keeping something safe ... still stops, he says.
Moore is currently working on modules for the Metasploit penetration-testing tool that would provide pen testers with exploits for the flaws in the Siemens products. Hes under embargo and unable to discuss details of the flaws discovered by Beresford, who wrote Metasploit modules for his proof-of-concept and shared them with Moore.
Moore says these types of attacks could also extend to other vendors SCADA systems, as well.
Patching Siemens systems ultimately might not solve much. Moore says few users are likely to deploy the firmware updates. It doesnt make sense to install these updates, Moore says. Patching SCADA systems isnt as simple as taking them down and slapping on the patch, and the devices are already very fragile to disruption, he says. Under NERC regulations, for example, any firmware updates require proper testing before going live. These [systems] are more difficult to upgrade. You cant just pull them offline and then put them back up, Moore notes.
Even so, Moore confirmed Siemens stipulation that a tight IT security setup, including a locked-down firewall and no wireless, for example, should protect plants from attacks exploiting these flaws. But, in the end, it really depends on the overall environment, he says. If you have 3,000 unprotected oil wells on the network, it wont help much, he notes.
Rick Moy, president of NSS Labs, says his firm will demonstrate the attacks to ICS operators in its Austin, Texas, laboratory on June 2. NSS Labs is accepting applications for registration
here
.
NSS Labs Beresford canceled his talk at TakedownCon 2011 in Dallas at the eleventh hour last week due to concerns about the contents possible risk to human life. He had planned to reveal vulnerabilities and proof-of-concept (PoC) exploit code for flaws in Siemens SCADA industrial-control systems products.
Meanwhile, Siemens today said its in direct contact with its customers on a regular basis with regard to security gaps identified in its products, that it has already built the updates for its PLCs, and is currently testing them in-house in joint cooperation with ICS-CERT.
We anticipate having these updates available for our customers within the next few weeks. Ongoing communication will be available at www.siemens.com/industrialsecurity, according to the company.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Siemens To Issue Patches For SCADA Products In Next Few Weeks