Thousands of industrial control systems (ICS) could be at risk of hacking due to critical vulnerabilities affecting a popular piece of software. SecurityWeek detailed how the flaws affect an application from 3S-Smart Software Solutions. The potential problem for ICS security stems from CODESYS, a hardware-independent middleware layer for programming Industrial Internet of Things (IIoT) and ICS.

SecurityWeek reported the issue has now been resolved by 3S-Smart Software Solutions. However, the need for a patch, which could take some time to roll out to all affected organizations, highlighted the need for IT managers to be aware of the risk to connected technologies, particularly when it comes to ICS security.

What Are the Vulnerabilities?

The flaws were discovered by security firm CyberX. Phil Neray, vice president of industrial cybersecurity and marketing at CyberX, described how the vulnerabilities affect all devices incorporating CODESYS Web Server v2.3 and earlier versions of the software.

CODESYS is used to program a range of devices, such as programmable logic controllers and human machine interfaces. CyberX detailed how these devices are used in almost all elements of critical industrial infrastructure, including power plants, oil and gas installations, and chemical and pharmaceutical factories.

The first vulnerability, CVE-2017-6027, allows an attacker to upload arbitrary files to the CODESYS Web Server and potentially create remote code execution. The second flaw, CVE-2017-6025, is a stack-based buffer overflow that attackers could use to crash the application or execute arbitrary code.

What Are the Risks?

The fear is that attackers could use the flaws to create safety failure and environmental damage at critical industrial infrastructure. ICS-CERT published an advisory note and rated the potential risk score of the vulnerabilities as critical because attackers can potentially gain remote code execution capabilities.

3S-Smart Software has released a patch, but CyberX suggested that the rollout process could be complicated by a range of factors. The firm, for example, pointed to the widespread use of the application: Estimates suggest more than 1 million CODESYS-based devices are sold every year.

These devices often run on systems that operate continuously in critical environments. CyberX noted that the lengthy process of waiting for manufacturer firmware updates and device reflashes could lead to “forever day vulnerabilities,” where flaws are ignored due to the complex process involved in creating a fix.

Ensuring ICS Security

Increased digitization expands the attack surface available to attackers. IDC predicted the worldwide installed base of IoT endpoints will reach 25.6 billion by 2019 and approximately 30 billion connections in 2020.

This increased connectivity likely means cybercriminal will turn their attention to ICS and critical infrastructure. Already, almost 40 percent of monitored ICS computers faced an attack at some point in the second half of 2016, according to Kaspersky Lab.

Security professionals who face these attacks face a significant technical challenge. However, there are a few best practices for mitigating risk:

  • Ensure ICS are never directly exposed to the public internet.
  • Isolate connected devices from corporate IT networks and keep their firewalls patched and updated.
  • Minimize potential compromise with subnets that isolate vulnerable ICS devices from outside systems.
  • Implement real-time monitoring to quickly identify suspicious or unauthorized activities.

By referring to these best practices, IT managers can help protect their ICS from impending vulnerabilities, attacks and a severely compromised automation infrastructure.

More from

Detecting Insider Threats: Leverage User Behavior Analytics

3 min read - Employees often play an unwitting role in many security incidents, from accidental data breaches to intentional malicious attacks. Unfortunately, most organizations don’t have the right protocols and processes to identify potential risks posed by their workforce. Based on a survey conducted by SANS Institute, 35% of respondents said they lack visibility into insider threats, while 30% said the inability to audit user access is a security blind spot in their organizations. In addition, the 2023 X-Force Threat Intelligence Index reported that…

3 min read

Poor Communication During a Data Breach Can Cost You — Here’s How to Avoid It

5 min read - No one needs to tell you that data breaches are costly. That data has been quantified and the numbers are staggering. In fact, the IBM Security Cost of a Data Breach estimates that the average cost of a data breach in 2022 was $4.35 million, with 83% of organizations experiencing one or more security incidents. But what’s talked about less often (and we think should be talked about more) is how communication — both good and bad — factors into…

5 min read

Increasingly Sophisticated Cyberattacks Target Healthcare

4 min read - It’s rare to see 100% agreement on a survey. But Porter Research found consensus from business leaders across the provider, payer and pharmaceutical/life sciences industries. Every single person agreed that “growing hacker sophistication” is the primary driver behind the increase in ransomware attacks. In response to the findings, the American Hospital Association told Porter Research, “Not only are cyber criminals more organized than they were in the past, but they are often more skilled and sophisticated.” Although not unanimous, the…

4 min read

Ransomware Renaissance 2023: The Definitive Guide to Stay Safer

2 min read - Ransomware is experiencing a renaissance in 2023, with some cybersecurity firms reporting over 400 attacks in the month of March alone. And it shouldn’t be a surprise: the 2023 X-Force Threat Intelligence Index found backdoor deployments — malware providing remote access — as the top attacker action in 2022, and aptly predicted 2022’s backdoor failures would become 2023’s ransomware crisis. Compounding the problem is the industrialization of the cybercrime ecosystem, enabling adversaries to complete more attacks, faster. Over the last…

2 min read