Cybersecurity IoT Media Release

Kaspersky Lab helps to eliminate seven vulnerabilities in industrial IoT platform solution

Kaspersky Lab experts have helped to identify and patch seven previously unknown vulnerabilities in the ThingsPro Suite, an industrial IoT (Internet of Things) platform, designed for industrial control systems (ICS) data acquisition and remote analysis. Some of the vulnerabilities found could potentially allow threat actors to gain highly privileged access to industrial IoT gateways and execute deadly commands. All vulnerabilities identified were reported to and patched by platform developer Moxa.

ThingsPro Suite is an industrial IoT platform that automatically gathers data from Operational Technology (OT) devices running at the industrial facility and submits it to an IoT cloud for further analysis. However, as much as such platforms are useful to ease Industrial IoT (IIoT) integration and maintenance, they can also be dangerous, unless they are developed and integrated with adequate security concerns in mind. As such solutions work as a connecting point between IT and OT security domains, vulnerabilities found in them can potentially allow attackers to gain access to an industrial network.

Within two weeks, Kaspersky Lab ICS CERT security researchers have been conducting a “preconceptual” study of the product, testing it for vulnerabilities that could be exploited remotely. As a result, seven zero-day vulnerabilities were found. One of the most severe could allow a remote attacker to execute any command on the target IIoT gateway. Another vulnerability made it possible for cybercriminals to gain root privileges, providing the ability to change the device’s configuration. Moreover, its exploitation could be automated, meaning that cybercriminals could automatically compromise multiple Moxa ThingsPro IoT gateways in different enterprises and to even potentially gain access to industrial networks of the organizations.

“Moxa is a trusted and respected brand in the industrial systems world. However, despite the company’s vast expertise and experience, its new product had a number of vulnerabilities, which shows that it is important even for industry leaders to conduct proper cybersecurity tests. We call on all ICS-product developers to act responsibly, performing regular vulnerability checks, treating the security of solutions for industrial systems as an integral and essential part of development,” said Alexander Nochvay, security researcher at Kaspersky Lab.

“The industrial control systems of organizations in the Philippines are definitely expanding as we speak, particularly in the areas of utilities, telecommunications, and manufacturing. We highly advise ICS officers to be proactive in ensuring that the stability of these critical infrastructures is protected in the face of frequent and severe cyber attacks,” said Yeo Siang Tiong, general manager at Kaspersky Lab Southeast Asia.

To keep industrial control systems safe, we advise that companies:

  • Restrict access of IIoT gateway devices to components of the enterprise’s OT and IT networks to the extent possible;
  • Restrict access to IIoT gateway devices from the enterprise network and the internet to the extent possible;
  • Set up monitoring of remote access to the enterprise’s OT network, as well as monitoring of access to individual ICS components (workstations, servers, and other equipment) inside the OT network;
  • Use solutions designed to analyze network traffic, detect and prevent network attacks – at the boundary of the enterprise network and at the boundary of the OT network;
  • Use dedicated solutions to monitor and perform deep analysis of network traffic on the OT network and detect attacks on industrial equipment;
  • Ensure the security of hosts on the enterprise’s IT and OT networks using solutions that provide protection from malware and cyberattacks.
  • Provide cyber-hygiene training to employees, partners, and suppliers who have access to the enterprise’s OT network.
Advertisements

One comment

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.