• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

New “Icefall” Bugs Include Critical DoS Flaw

You are here: Home / General Cyber Security News / New “Icefall” Bugs Include Critical DoS Flaw
November 30, 2022

Researchers at Forescout have produced aspects of much more OT product vulnerabilities that they say stem from an “insecure-by-design” approach to manufacturing.

The bugs, which incorporate a critical denial of support (DoS) CVE, are uncovered in merchandise from German vendors Codesys and Festo.

CVE-2022-4048 is a logic manipulation bug in the Codesys V3 automation program for engineering manage programs. Forescout stated Codesys is jogging on various million products and around 1000 types from about 500 brands.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The vulnerability stems from weak cryptography, specifically:

  • Session keys are produced using an insecure pseudo-random number generator (PRNG) working off a little and predictable seed
  • The encryption scheme uses an insecure mode of procedure – compromising confidentiality and integrity no matter of session key strength

The next vulnerability, CVE-2022-3079, is a denial-of-service bug which has an effect on Festo CPX-CEC-C1 and CPX-CMXX Codesys V2 controllers. It enables unauthenticated, distant obtain to critical webpage capabilities, which might result in DoS.

Although these 1st two flaws ended up specified a CVSS score of 7.7 and 7.5 respectively, the closing 1, impacting Festo controllers employing the FGMC protocol, is a rated critical with a CVSS of 9.8.

CVE-2022-3270 was categorized by Forescout as stemming from an insecure engineering protocol, most likely foremost to DoS. The Festo Generic Multicast (FGMC) protocol makes it possible for for the unauthenticated reboot of controllers around the network, indicating attackers can tamper with devices, together with controllers, when they’ve obtained distant entry through the network.

Forescout claimed it learned 1000 Festo controllers amongst its buyers, mainly in the producing sector.

The conclusions comply with a main report posted by Forescout in excess of the summer time in which it identified 56 vulnerabilities in merchandise from 10 OT makers, highlighting the bad security practices followed by several in this area.

“By connecting OT to IoT and IT devices, vulnerabilities that after had been noticed as insignificant because of to their absence of connectivity are now superior targets for lousy actors,” warned Forescout head of security study, Daniel dos Santos.

“It is essential for asset owners to understand how these legacy devices, the lack of vulnerability administration encompassing them, and the often-untrue perception of security offered by certifications complicate OT risk administration initiatives.”


Some areas of this report are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News Let’s Encrypt Issues Three Billionth Certificate
Next Post: French Electricity Provider Fined for Storing Users’ Passwords with Weak MD5 Algorithm french electricity provider fined for storing users' passwords with weak»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.