cfo-as logo
Story image

Industrial control component vulnerabilities up 30%

18 Apr 2019

The number of new vulnerabilities in industrial control systems (ICS) grew by 30% between 2017 and 2018, according to Positive Technologies.

The US still has a lead in the number of Internet-accessible ICS components, with 95,661 IP addresses for ICS components found in 2018 compared to 64,287 in 2017.

In the UK, the number of devices discoverable on the Internet nearly doubled from 4,240 to 7,874 in the same time frame.

More than 220,000 ICS components are discoverable online, which is 27% higher than in 2017.

The vulnerable systems are mainly located in the US (95,661), Germany (21,449), China (12,262), France (11,007), Italy (9,918), and Canada (9,580).

Positive Technologies warns organisations to be wary of the availability of network devices on the Internet, such as industrial Ethernet switches or Ethernet media converters, and the risks it presents. 

Yet, in 2017, the share of Internet-accessible network devices grew from 5 to 13%, rising to 19% in 2018.

Approximately 30,000 Honeywell devices were detected online, and the company remains in the lead for the number of Internet-available components.

For the second year in a row, Schneider Electric had the highest number of new vulnerabilities (69 vulnerabilities in 2018), despite the fact that the number of vulnerabilities found in Siemens equipment almost doubled compared to the previous year, reaching 66.

The high number of vulnerabilities within the equipment of these two companies can be explained by the popularity of their product lines.

In total, 257 vulnerabilities were detected in ICS components in 2018, which is 30% higher than in 2017.

The share of critical and high-severity vulnerabilities increased by 17%.

Fifty-eight percent of vulnerabilities allow attackers to have more than one impact on a device, compromising its confidentiality, integrity, and availability.

In only four percent of cases, the difficulty of attack was assessed as high.

In other words, attackers do not usually require any special conditions to disrupt the security of ICS elements.

About 75% of vulnerabilities have the potential to affect ICS availability in full or part.

The exploitation of these vulnerabilities, for example in network equipment, could disturb a target's operation by disrupting command transfer between components.

A significant share of vulnerabilities involves improper authentication or excessive privileges. More than half of these vulnerabilities (64%) can be exploited remotely.

Positive Technologies Industry and SCADA research analyst Paolo Emiliani says, “In 2018, we saw that industrial processes can be affected not only by targeted malware, such as Triton cyberweapon, but also by attacks against IT infrastructure.”

In March, LockerGoga ransomware disrupted the operation of Norsk Hydro, a large aluminium manufacturer.

In 2017, the WannaCry virus triggered an alarm within Boeing and shut down several plants of Taiwan Semiconductor Manufacturing Company.

It means that even ordinary viruses can affect a target's operations online.

“That is why Positive Technologies keeps on highlighting the importance of complex protection of industrial companies, which includes separation of technological, corporate, and external networks, timely security updates, and regular analysis of ICS security to detect potential attack vectors,” says Emiliani.

Positive Technologies says that on average, vendors take a long time to fix vulnerabilities - more than six months.

The elimination of some vulnerabilities (measured by the time period from vendor notification to release of a patch) can take more than two years.

For end users, such protracted responses increase the risk of exploitation of device vulnerabilities.

Story image
Gartner: Three trends that will impact the future of the supply chain
“CSCOs are tasked to design a supply chain organisation that fits into this new era."More
Story image
Gartner reveals the top strategic tech trends for 2021
“CIOs are striving to adapt to changing conditions to compose the future business - this requires the organisational plasticity to form and reform dynamically. Gartner’s top strategic technology trends for 2021 enable that plasticity.”More
Story image
Financial institutions in APAC region to invest millions in fraud prevention
"The pandemic is creating a lot of uncertainty, but the majority of FIs in APAC recognise that an end to end fraud management platform is strategic to differentiating themselves from the highly disruptive landscape they are playing in."More
Story image
Avoid the 'dump and run' approach: Succeed with data using DataOps
When implemented effectively and appropriately, DataOps has the potential to radically transform the way an organisation works with data, bringing along a range of operational benefits.More
Story image
IDC: Digital infrastructure will be the catalyst for success post-pandemic
If organisations properly apply the key digital infrastructure tenets - technology adoption and IT governance - then revenue growth and business expansion will soon follow, according to the research.More
Story image
Cisco launches new WAN edge platform
Cisco launches new WAN edge platform The Catalyst 8000 Edge platform provides flexible options for secure connectivity and visibility to applications across cloud, data centre and edge.More