April 11, 2017 By Mark Samuels 2 min read

Thousands of industrial control systems (ICS) could be at risk of hacking due to critical vulnerabilities affecting a popular piece of software. SecurityWeek detailed how the flaws affect an application from 3S-Smart Software Solutions. The potential problem for ICS security stems from CODESYS, a hardware-independent middleware layer for programming Industrial Internet of Things (IIoT) and ICS.

SecurityWeek reported the issue has now been resolved by 3S-Smart Software Solutions. However, the need for a patch, which could take some time to roll out to all affected organizations, highlighted the need for IT managers to be aware of the risk to connected technologies, particularly when it comes to ICS security.

What Are the Vulnerabilities?

The flaws were discovered by security firm CyberX. Phil Neray, vice president of industrial cybersecurity and marketing at CyberX, described how the vulnerabilities affect all devices incorporating CODESYS Web Server v2.3 and earlier versions of the software.

CODESYS is used to program a range of devices, such as programmable logic controllers and human machine interfaces. CyberX detailed how these devices are used in almost all elements of critical industrial infrastructure, including power plants, oil and gas installations, and chemical and pharmaceutical factories.

The first vulnerability, CVE-2017-6027, allows an attacker to upload arbitrary files to the CODESYS Web Server and potentially create remote code execution. The second flaw, CVE-2017-6025, is a stack-based buffer overflow that attackers could use to crash the application or execute arbitrary code.

What Are the Risks?

The fear is that attackers could use the flaws to create safety failure and environmental damage at critical industrial infrastructure. ICS-CERT published an advisory note and rated the potential risk score of the vulnerabilities as critical because attackers can potentially gain remote code execution capabilities.

3S-Smart Software has released a patch, but CyberX suggested that the rollout process could be complicated by a range of factors. The firm, for example, pointed to the widespread use of the application: Estimates suggest more than 1 million CODESYS-based devices are sold every year.

These devices often run on systems that operate continuously in critical environments. CyberX noted that the lengthy process of waiting for manufacturer firmware updates and device reflashes could lead to “forever day vulnerabilities,” where flaws are ignored due to the complex process involved in creating a fix.

Ensuring ICS Security

Increased digitization expands the attack surface available to attackers. IDC predicted the worldwide installed base of IoT endpoints will reach 25.6 billion by 2019 and approximately 30 billion connections in 2020.

This increased connectivity likely means cybercriminal will turn their attention to ICS and critical infrastructure. Already, almost 40 percent of monitored ICS computers faced an attack at some point in the second half of 2016, according to Kaspersky Lab.

Security professionals who face these attacks face a significant technical challenge. However, there are a few best practices for mitigating risk:

  • Ensure ICS are never directly exposed to the public internet.
  • Isolate connected devices from corporate IT networks and keep their firewalls patched and updated.
  • Minimize potential compromise with subnets that isolate vulnerable ICS devices from outside systems.
  • Implement real-time monitoring to quickly identify suspicious or unauthorized activities.

By referring to these best practices, IT managers can help protect their ICS from impending vulnerabilities, attacks and a severely compromised automation infrastructure.

More from

Hive0137 and AI-supplemented malware distribution

12 min read - IBM X-Force tracks dozens of threat actor groups. One group in particular, tracked by X-Force as Hive0137, has been a highly active malware distributor since at least October 2023. Nominated by X-Force as having the “Most Complex Infection Chain” in a campaign in 2023, Hive0137 campaigns deliver DarkGate, NetSupport, T34-Loader and Pikabot malware payloads, some of which are likely used for initial access in ransomware attacks. The crypters used in the infection chains also suggest a close relationship with former…

Unveiling the latest banking trojan threats in LATAM

9 min read - This post was made possible through the research contributions of Amir Gendler.In our most recent research in the Latin American (LATAM) region, we at IBM Security Lab have observed a surge in campaigns linked with malicious Chrome extensions. These campaigns primarily target Latin America, with a particular emphasis on its financial institutions.In this blog post, we’ll shed light on the group responsible for disseminating this campaign. We’ll delve into the method of web injects and Man in the Browser, and…

Crisis communication: What NOT to do

4 min read - Read the 1st blog in this series, Cybersecurity crisis communication: What to doWhen an organization experiences a cyberattack, tensions are high, customers are concerned and the business is typically not operating at full capacity. Every move you make at this point makes a difference to your company’s future, and even a seemingly small mistake can cause permanent reputational damage.Because of the stress and many moving parts that are involved, businesses often fall short when it comes to communication in a crisis.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today