• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers warn of flaws in widely used industrial gas analysis

Researchers Warn of Flaws in Widely Used Industrial Gas Analysis Equipment

You are here: Home / General Cyber Security News / Researchers Warn of Flaws in Widely Used Industrial Gas Analysis Equipment
June 28, 2024

A number of security flaws have been disclosed in Emerson Rosemount fuel chromatographs that could be exploited by destructive actors to attain sensitive information, induce a denial-of-services (DoS) situation, and even execute arbitrary commands.

The flaws impact GC370XA, GC700XA, and GC1500XA and reside in versions 4.1.5 and prior.

In accordance to operational technology (OT) security company Claroty, the vulnerabilities involve two command injection flaws and two separate authentication and authorization vulnerabilities that could be weaponized by unauthenticated attackers to conduct a large variety of malicious actions ranging from authentication bypass to command injection.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“Thriving exploitation of these vulnerabilities could permit an unauthenticated attacker with network access to run arbitrary commands, accessibility delicate details, result in a denial-of-company issue, and bypass authentication to acquire admin abilities,” the U.S. Cybersecurity and Infrastructure Security Company (CISA) stated in an advisory launched in January.

Cybersecurity

The chromatograph, which is applied for carrying out critical fuel measurements, can be configured and managed by implies of a software package identified as MON. The software package can also be applied to shop critical information and make reports this sort of as chromatograms, alarm record, party logs, and maintenance logs.

Industrial Gas Analysis Equipment

Claroty’s analysis of the firmware and the proprietary protocol used for communications in between the system and the Windows customer named MON2020 has revealed the pursuing shortcomings –

  • CVE-2023-46687 (CVSS rating: 9.8) – An unauthenticated consumer with network entry could execute arbitrary instructions in root context from a remote laptop or computer
  • CVE-2023-49716 (CVSS rating: 6.9) – An authenticated person with network obtain could operate arbitrary instructions from a remote laptop or computer
  • CVE-2023-51761 (CVSS rating: 8.3) – An unauthenticated person with network access could bypass authentication and purchase admin capabilities by resetting the associated password
  • CVE-2023-43609 (CVSS rating: 6.9) – An unauthenticated consumer with network accessibility could acquire accessibility to delicate info or lead to a denial-of-services ailment

Pursuing dependable disclosure, Emerson has introduced [PDF] an updated model of the firmware that addresses the vulnerabilities. The enterprise is also recommending conclude users to observe cybersecurity greatest procedures and ensure that the afflicted goods are not directly exposed to the internet.

Cybersecurity

The disclosure comes as Nozomi Networks detailed a number of flaws in AiLux RTU62351B that could be abused to access sensitive assets on the gadget, change its configuration, and even realize execution of arbitrary commands as root. The vulnerabilities have been collectively dubbed I11USION.

Flaws have also been determined in Proges As well as temperature checking products and their connected application, particularly Sensor Net Link and Thermoscan IP, that could allow admin privileges more than critical medical devices, thereby generating it possible for a destructive actor to manipulate method configurations, install malware, and exfiltrate knowledge.

These vulnerabilities, which continue being unpatched, could also end result in a DoS ailment of healthcare monitoring infrastructure, top to spoilage of temperature-delicate medicines and vaccines.

Located this posting appealing? Abide by us on Twitter  and LinkedIn to browse extra distinctive written content we put up.


Some components of this report are sourced from:
thehackernews.com

Previous Post: «teamviewer detects security breach in corporate it environment TeamViewer Detects Security Breach in Corporate IT Environment
Next Post: New SnailLoad Attack Exploits Network Latency to Spy on Users’ Web Activities new snailload attack exploits network latency to spy on users'»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.