Kaspersky Lab identifies 7 vulnerabilities in industrial IoT platform – Technologist

Cybersecurity firm Kaspersky Lab experts have helped to identify and patch seven previously unknown vulnerabilities in the ThingsPro Suite, an industrial IoT (IIoT) platform designed for industrial control systems (ICS) data acquisition and remote analysis.

All vulnerabilities identified were reported to and patched by platform developer Moxa.

Of the seven zero-day vulnerabilities found, Kaspersky said one of the most severe could allow a remote attacker to execute any command on the target IIoT gateway.

Another vulnerability made it possible for cybercriminals to gain root privileges, providing the ability to change the device’s configuration. Its exploitation could be automated, which means that cybercriminals could automatically compromise multiple Moxa ThingsPro IoT gateways in different enterprises and to even potentially gain access to industrial networks of the organizations.

Moreover, some of the vulnerabilities found could potentially allow threat actors to gain highly privileged access to industrial IoT gateways and execute deadly commands.

“Moxa is a trusted and respected brand in the industrial systems world. However, despite the company’s vast expertise and experience, its new product had a number of vulnerabilities, which shows that it is important even for industry leaders to conduct proper cybersecurity tests,” said Alexander Nochvay, security researcher at Kaspersky Lab.

“We highly advise ICS officers to be proactive in ensuring that the stability of these critical infrastructure is protected in the face of frequent and severe cyber attacks,” added Yeo Siang Tiong, General Manager at Kaspersky Lab Southeast Asia.

ThingsPro Suite is an industrial internet of things platform that automatically gathers data from Operational Technology (OT) devices running at the industrial facility and submits it to an IoT cloud for further analysis.

However, as much as such platforms are useful to ease Industrial IoT (IIoT) integration and maintenance, they can also be dangerous, unless they are developed and integrated with adequate security concerns in mind.

As such solutions work as a connecting point between IT and OT security domains, vulnerabilities found in them can potentially allow attackers to gain access to an industrial network.

To keep industrial control systems safe, Kaspersky Lab advises companies to:

  1. Restrict access of IIoT gateway devices to components of the enterprise’s OT and IT networks to the extent possible;
  2. Restrict access to IIoT gateway devices from the enterprise network and the internet to the extent possible;
  3. Set up monitoring of remote access to the enterprise’s OT network, as well as monitoring of access to individual ICS components (workstations, servers, and other equipment) inside the OT network;
  4. Use solutions designed to analyze network traffic, detect and prevent network attacks – at the boundary of the enterprise network and at the boundary of the OT network;
  5. Use dedicated solutions to monitor and perform deep analysis of network traffic on the OT network and detect attacks on industrial equipment;
  6. Ensure the security of hosts on the enterprise’s IT and OT networks using solutions that provide protection from malware and cyberattacks.
  7. Provide cyber-hygiene training to employees, partners and suppliers who have access to the enterprise’s OT network.

Add a Comment

Your email address will not be published. Required fields are marked *

x