Vulnerabilities in industrial protocol

June 2018 News, Cyber Security

Kaspersky Lab ICS CERT has analysed the OPC UA (Object Linking and Embedding for Process Control Unified Automation) protocol, which is designed to secure data transfer between servers and clients in industrial systems, including critical infrastructure.

Kaspersky Lab ICS CERT experts analysed OPC UA architecture and its products. They examined its open-source code (available on GitHub), including a sample server, and discovered that current implementations of the protocol had code design and writing errors. These errors should not exist in such widespread critical infrastructure software. Overall, 17 zero-day vulnerabilities in the OPC Foundation’s products were identified and reported to the developers, who fixed them accordingly. All were fixed by the end of March 2018.

OPC UA is an industrial protocol, which was developed and released by the OPC Foundation in 2006 for reliable and secure data transmission between various systems on an industrial network. This protocol is widely used by major vendors in modern industrial facilities, in the manufacturing, oil and gas, pharmaceuticals industries and others. Its gateways are installed by a growing number of industrial enterprises, for communication in automated process control and telemetry, and monitoring and telecontrol systems, allowing these enterprises to unify their management processes. The protocol is also used in IoT and smart city components, which are increasingly attracting hacker attention.

In addition, Kaspersky Lab ICS CERT analysed third-party software based on this industrial protocol, including solutions by leading ­industry vendors. In most cases, they discovered flaws were caused by the developers not using some of the protocol implementation ­functions properly. In other cases, vulnerabilities were the result of incorrect modifications applied to the protocol’s infrastructure. Thus, experts discovered the insecure implementation of functions in a commercial product, despite the fact that the original OPC Foundation implementation did not include errors. As a result, such modifications in the protocol’s logic, made by vendors for unknown reasons, was leading to risky functionality.

All the vulnerabilities found in the OPC UA protocol implementations could result in heavy damage to industry. On the one hand, there was the risk of denial-of-service (DoS) issues, which could pose serious threats to industrial systems by disrupting or shutting down industrial processes. On the other hand, remote code execution was made possible, allowing attackers to send any kind of server commands to control industrial processes, or continue their intrusion into the network.

“Very often software developers put too much trust in industrial protocols, and implement the technology in their solutions without putting the product code through security checks. Thus, vulnerabilities in the example used can affect complete product lines, so it’s highly important that vendors pay close attention to such widely available technologies. Moreover, they should not be deceived by the idea that they can design their own piece of software. Many think this could be more efficient and secure than existing software, but even a brand new piece of software may still contain numerous vulnerabilities,” said Sergey Temnikov, senior security researcher at Kaspersky lab ICS CERT.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New hires at iPulse
Issue 7 2020, iPulse Systems , News
iPulse has welcomed two new employees into its ranks. Shai Weil has been appointed as operations director, while Corneli Botha is the new customer sales liaison.

Read more...
HID Global acquires Access-IS
Issue 7 2020, HID Global , News
HID Global acquires provider of miniaturised reader devices that combine key technologies for mission-critical markets.

Read more...
Securing digital transformation
Issue 7 2020 , News
Schneider Electric partners with Fortinet to strengthen ability to secure operations across the business lifecycle and unlock the advantages of a secure IIoT.

Read more...
Suprema integrates with Paxton’s Net2 access control
Issue 7 2020, Suprema , News
Suprema has announced it has integrated its devices with Paxton’s access control system, Net2.

Read more...
Free cybersecurity courses
Issue 7 2020 , News
Check Point Software partners with Harvard and MIT-founded edX to deliver free online courses to help close the cybersecurity skills gap.

Read more...
Fidelity partners with Auto & General Insurance
Issue 7 2020, Fidelity Security Group , News
Fidelity Services Group in partnership with Auto & General Insurance has launched Fidelity InSure, a comprehensive vehicle, home, and building insurance offering.

Read more...
More apps for open camera OS
Issue 7 2020 , News
The App Challenge will result in 21 new apps running on the Security & Safety Things’ camera OS, based on the Android Open Source Project.

Read more...
Milestone Systems announces Thomas Jensen as new CEO
Issue 7 2020, Milestone Systems , News
Milestone Systems announced that its board of directors has appointed Thomas Jensen as chief executive officer. Jensen will assume the role on October 1, 2020.

Read more...
Suprema announces its first virtual event
Issue 7 2020, Suprema , News
Suprema will be hosting its first virtual event, Suprema Connect 2020, which is scheduled to take place over one month from September 15.

Read more...
From the editor's desk: Waiting for PoPI
Issue 7 2020, Technews Publishing , News
A while ago we heard of yet another cyber breach, this time from Experian.

Read more...