• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
rockwell automation controllogix bugs expose industrial systems to remote attacks

Rockwell Automation ControlLogix Bugs Expose Industrial Systems to Remote Attacks

You are here: Home / General Cyber Security News / Rockwell Automation ControlLogix Bugs Expose Industrial Systems to Remote Attacks
July 13, 2023

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has alerted of two security flaws impacting Rockwell Automation ControlLogix EtherNet/IP (ENIP) communication module models that could be exploited to accomplish remote code execution and denial-of-provider (DoS).

“The outcomes and effects of exploiting these vulnerabilities differ based on the ControlLogix method configuration, but they could lead to denial or decline of regulate, denial or decline of view, theft of operational details, or manipulation of control for disruptive or damaging consequences on the industrial procedure for which the ControlLogix technique is responsible,” Draogos mentioned.

The checklist of flaws is as follows –

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


  • CVE-2023-3595 (CVSS score: 9.8) – An out-of-bounds publish flaw impacting 1756 EN2* and 1756 EN3* products and solutions that could final result in arbitrary code execution with persistence on the focus on method by means of maliciously crafted frequent industrial protocol (CIP) messages.
  • CVE-2023-3596 (CVSS rating: 7.5) – An out-of-bounds create flaw impacting 1756 EN4* items that could lead to a DoS affliction by way of maliciously crafted CIP messages.

“Prosperous exploitation of these vulnerabilities could make it possible for destructive actors to acquire distant entry to the operating memory of the module and conduct malicious exercise,” CISA reported.

Even worse, the flaws could be abused to most likely overwrite any component of the method to fly underneath the radar and continue to be persistent, not to point out render the module untrustworthy.

Upcoming WEBINARShield In opposition to Insider Threats: Grasp SaaS Security Posture Administration

Apprehensive about insider threats? We have got you protected! Be a part of this webinar to discover useful techniques and the secrets of proactive security with SaaS Security Posture Administration.

Join Right now

Impacted equipment include 1756-EN2T, 1756-EN2TK, 1756-EN2TXT, 1756-EN2TP, 1756-EN2TPK, 1756-EN2TPXT, 1756-EN2TR, 1756-EN2TRK, 1756-EN2TRXT, 1756-EN2F, 1756-EN2FK, 1756-EN3TR, 1756-EN3TRK, 1756-EN4TR, 1756-EN4TRK, and 1756-EN4TRXT. Patches have been accessible by Rockwell Automation to deal with the issues.

“The sort of obtain presented by CVE-2023-3595 is very similar to the zero-day used by XENOTIME in the TRISIS attack,” the industrial cybersecurity company stated. “Equally permit for arbitrary firmware memory manipulation, even though CVE-2023-3595 targets a communication module responsible for managing network instructions. However, their effects is the exact.”

TRISIS, also acknowledged as TRITON, is an industrial control programs (ICS) malware that has been previously observed concentrating on Schneider Electric’s Triconex protection instrumented method (SIS) controllers utilised in oil and gas facilities. A petrochemical plant in Saudi Arabia was identified as a victim in late 2017, in accordance to Dragos and Mandiant.

Dragos cautioned it learned an “unreleased exploit capability leveraging these vulnerabilities” that are affiliated with an identified country-point out team and that as of mid-July 2023, “there was no evidence of exploitation in the wild and the targeted victim businesses and field verticals were mysterious.”

“In addition to the compromise of the susceptible module alone, the vulnerability could also let an attacker to influence the industrial course of action alongside with the underlying critical infrastructure, which may end result in doable disruption or destruction,” Tenable researcher Satnam Narang mentioned of CVE-2023-3595.

Identified this post attention-grabbing? Stick to us on Twitter  and LinkedIn to browse more special material we post.


Some components of this posting are sourced from:
thehackernews.com

Previous Post: «u.s. government agencies' emails compromised in china backed cyber attack U.S. Government Agencies’ Emails Compromised in China-Backed Cyber Attack
Next Post: Fake PoC for Linux Kernel Vulnerability on GitHub Exposes Researchers to Malware fake poc for linux kernel vulnerability on github exposes researchers»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Copyright © TheCyberSecurity.News, All Rights Reserved.