February 11, 2016 By Douglas Bonderud 2 min read

Programmable logic controllers (PLCs) aren’t the first device class that leaps to mind when considering popular attack vectors. According to SecurityWeek, however, two new flaws have been discovered in the popular Siemens S7-1500 CPU line of PLCs — one of which earns a high-severity CVSS v3 risk score of 7.5.

Siemens has already taken steps to remedy the issues, but with the Internet of Things (IoT) quickly becoming a high-value target, it’s worth taking a hard look at these new logical gaps.

High-Severity Issues

As noted by the SecurityWeek piece, French security firms Lexfo and Amossys reported the two Siemens flaws — CVE-2016-2200 and CVE-2016-2201 — to the country’s National Agency for Computer Security (ANSSI). They did so after discovering the issues affected all firmware prior to 1.8.3, which fixes the problems. Both exploits required attackers to gain network access; Siemens itself recommended operating the S7-1500 line on trusted networks in any case.

Of the two, CVE-2016-2201 poses the less serious threat: The flaw makes it possible for attackers to reduce the efficiency of a feature designed to guard against relay attacks. Combined with sophisticated relay attacks, this flaw could be devastating, but it is clearly the exception rather than the rule — good to know but hardly an immediate threat.

CVE-2016-2200, meanwhile, is a different animal. By sending specific data packets to port 102/TCP, it’s possible to cause a full device STOP that can only be corrected with a manual RUN command. The result? Potentially devastating denial of service (DoS).

These aren’t the first security flaws for Siemens devices this year. In January, the company released firmware updates for its line of building automation products to combat a cross-site scripting (XSS) vulnerability.

Fundamental Flaw?

So what’s the logical conclusion here? Does Siemens simply make a product that can’t hack it in on the industrial IoT market? Hardly. As noted by The Enterprisers Project, the issue is endemic of IoT itself, a fundamental flaw built into the notion of an always-connected network.

Here’s the issue: Many devices now connected to both corporate networks and the Internet at large were never designed to fulfill this function. Instead, they were purpose-built to complete a specific task that didn’t require any type of Internet-facing safeguards.

As a result, industrial control systems (ICS), supervisory control and data acquisition (SCADA) devices and PLCs typically have minimal defenses — if any — against determined attackers. That problem is rapidly widening in scope as more Internet-facing devices are deployed and residential users begin adopting similar technology, creating a massive attack surface for cybercriminals.

In fact, residential devices may form the foundation of new attacks on large-scale energy grids. As reported by Wired, a team of researchers discovered it’s possible to hack remote shutoff devices on residential and commercial air conditioners — used to conserve energy during peak periods — and instead turn them on full blast, creating demand that’s impossible for energy producers to meet. That could overload grids and send an entire city into darkness.

Bottom line? There’s a logic to the new attacks on IoT devices: They’re simply not ready to handle advanced threats. Companies like Siemens are doing their best to patch in effective countermeasures after the fact, but changing this paradigm requires more than new firmware. Native IoT security must replace ad hoc defense for companies to completely plug high-severity gaps and bring connected devices up to par with evolving security standards.

More from

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

DOD establishes Office of the Assistant Secretary of Defense for Cyber Policy

2 min read - The federal government recently took a new step toward prioritizing cybersecurity and demonstrating its commitment to reducing risk. On March 20, 2024, the Pentagon formally established the new Office of the Assistant Secretary of Defense for Cyber Policy to supervise cyber policy for the Department of Defense. The next day, President Joe Biden announced Michael Sulmeyer as his nominee for the role.“In standing up this office, the Department is giving cyber the focus and attention that Congress intended,” said Acting…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today