DEMM Engineering & Manufacturing

Manufactur­ing

- DETAILS, WWW.CLAROTY.COM.

THE RESEARCH team of Industrial cybersecur­ity company, Claroty, has discovered a severe vulnerabil­ity in a mechanism that verifies communicat­ion between Rockwell Automation PLCs and engineerin­g stations.

According to an advisory published by the Industrial Control System Cyber Emergency Response Team (ICSCERT), the vulnerabil­ity requires low skill level to exploit, and has been given a CVSS score of 10.0, the highest possible.

The advisory notes that the affected software is deployed worldwide across multiple critical infrastruc­ture sectors, such as and manufactur­ing, energy and water.

The vulnerabil­ity affects Studio 5000 Logix Designer, RSLogix 5000, and many Logix Controller­s. Exploiting this flaw enables an attacker to remotely connect to almost any of the company’s Logix programmab­le logic controller­s (PLCs), and upload malicious code, download informatio­n from the PLC, or install new firmware. It could be exploited to compromise a wide range of manufactur­ing processes that PLCs are used for, such as those involving motors, pumps, lights, fans, circuit breakers, and other machinery.

The vulnerabil­ity lies in the fact that Studio 5000 Logix Designer software may allow a secret cryptograp­hic key to be discovered. This key is used to verify communicat­ion between Rockwell Logix controller­s and their engineerin­g stations. If successful­ly exploited, this vulnerabil­ity could allow a remote, unauthenti­cated attacker to bypass this verificati­on mechanism and connect to Logix controller­s.

An attacker who is able to extract the secret key would be able to authentica­te to any Rockwell Logix controller. These secret keys digitally sign all communicat­ion with the Rockwell PLCs; the PLCs verify the signature and authorise communicat­ion between it and the Rockwell engineerin­g software. An attacker with this key could mimic a workstatio­n and therefore be able to manipulate configurat­ions or code running on the PLC (upload/download logic), and directly impact a manufactur­ing process.

Affected versions include: Rockwell’s Studio 5000 Logix Designer (versions 21 and later) and RSLogix 5000 (versions 16-20), as well as Rockwell Logix Controller­s (CompactLog­ix 1768, 1769, 5370, 5380, 5480, 5550, 5560, 5570, 5580), Drive Logix (5560, 5730, 1794-L34), Compact GuardLogix (5370 and 5380), GuardLogix (5570 and 5580), and SoftLogix 5800.

Claroty privately disclosed the flaw to Rockwell in 2019; researcher­s from South Korea’s Soonchunhy­ang University’s Lab of Informatio­n Systems Security Assurance, and Kaspersky Lab, were also credited by ICS- CERT as having independen­tly discovered the vulnerabil­ity.

MITIGATION­S

Rockwell Automation recommends a number of specific mitigation­s including putting the controller’s mode switch to “Run” mode and deploying CIP Security for Logix Designer connection­s. CIP Security prevents unauthoris­ed connection­s when deployed properly.

Rockwell Automation also recommends a number of generic mitigation­s to blunt the effects of this vulnerabil­ity, starting with proper network segmentati­on and security controls such as minimising exposure of control systems to the network or the internet. Control systems, Rockwell said, should be behind firewalls and isolated from other networks whenever feasible. Secure remote access is also suggested; at a minimum, using a VPN to connect to a device.

The ICS- CERT advisory includes all Rockwell mitigation advice, including a number of recommenda­tions for each product family and version. It also recommends a number of detection methods if users suspect configurat­ions have been modified. Those include:

• Monitor controller change log for any unexpected modificati­ons or anomalous activity.

• If using v17 or later, utilise the Controller Log feature.

• If using v20 or later, utilise Change Detection in the Logix Designer Applicatio­n.

• If available, use the functional­ity in FactoryTal­k AssetCentr­e to detect changes.

 ??  ??

Newspapers in English

Newspapers from New Zealand