Heimdal Security Blog

CISA Warns of Critical Vulnerabilities on Industrial Control Systems

Sewio, InHand Networks, SAUTER Controls, and Siemens Industrial Control Systems (ICS) are vulnerable to cyberattacks, according to the U.S. Cybersecurity and Infrastructure Security Agency (CISA).

The advisories released on January 12th contain information on vulnerabilities, exploits, and other security flaws regarding ICSs. Users and admins are urged to consult the advisories for more technical information and mitigating measures.

The most severe of the flaws relate to Sewio’s RTLS Studio, which could be exploited by an attacker to ”obtain unauthorized access to the server, alter information, create a denial-of-service condition, gain escalated privileges, and execute arbitrary code”.

Source

Industrial Control Systems` vulnerabilities discovered by CISA summarised

1. Sewio RTLS Studio

Researchers found a series of vulnerabilities in RTLS Studio:

Successfully exploiting these flaws could give an attacker unauthorized access to the server, the ability to change data, and to run arbitrary code. CISA claims version 2.0.0 up to and including version 2.6.2 are all affected.

As mitigation measures, Sewio advises users to update their devices and recommends a series of workarounds:

2. InHand Networks InRouter

InRouter302, and InRouter615 are affected by:

If threat actors manage to exploit these vulnerabilities, they could inflict injection of commands into the message queuing telemetry transport (MQTT), data leakage, and remote code execution. If chained, these flaws could allow an unauthorized remote user to completely compromise every cloud-managed InHand Networks device that can be accessed via the cloud.

InHand urges users to update their devices as follows:

3. SAUTER Controls Nova 200 – 220 Series (PLC 6)

Nova 200–220 Series (PLC 6) was reported affected with two vulnerabilities:

Threat actors could exploit these vulnerabilities to gain access to sensitive data and perform remote code execution.

SAUTER Controls stopped producing this device in 2016, so it is no longer supported. The company advises users to enforce all security measures needed to protect the building automation network access. Where necessary, users should also evaluate and upgrade legacy systems to newer solutions.

4. Siemens Mendix SAML Module

The Mendix SAML equipment is vulnerable to improper neutralization of input during web page generation (”Cross-site Scripting”).

Threat actors could use this vulnerability to trick users to click on malicious links and get access to sensitive data as a result.

Siemens recommends a series of solutions that consumers can implement:

At the moment, according to CISA cyber researchers, from what they know, there are no public exploits that target these vulnerabilities.

If you liked this article, follow us on LinkedIn, Twitter, Facebook, Youtube, and Instagram for more cybersecurity news and topics.