• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
rockwell automation controllogix bugs expose industrial systems to remote attacks

Rockwell Automation ControlLogix Bugs Expose Industrial Systems to Remote Attacks

You are here: Home / General Cyber Security News / Rockwell Automation ControlLogix Bugs Expose Industrial Systems to Remote Attacks
July 13, 2023

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has alerted of two security flaws impacting Rockwell Automation ControlLogix EtherNet/IP (ENIP) communication module models that could be exploited to accomplish remote code execution and denial-of-provider (DoS).

“The outcomes and effects of exploiting these vulnerabilities differ based on the ControlLogix method configuration, but they could lead to denial or decline of regulate, denial or decline of view, theft of operational details, or manipulation of control for disruptive or damaging consequences on the industrial procedure for which the ControlLogix technique is responsible,” Draogos mentioned.

The checklist of flaws is as follows –

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


  • CVE-2023-3595 (CVSS score: 9.8) – An out-of-bounds publish flaw impacting 1756 EN2* and 1756 EN3* products and solutions that could final result in arbitrary code execution with persistence on the focus on method by means of maliciously crafted frequent industrial protocol (CIP) messages.
  • CVE-2023-3596 (CVSS rating: 7.5) – An out-of-bounds create flaw impacting 1756 EN4* items that could lead to a DoS affliction by way of maliciously crafted CIP messages.

“Prosperous exploitation of these vulnerabilities could make it possible for destructive actors to acquire distant entry to the operating memory of the module and conduct malicious exercise,” CISA reported.

Even worse, the flaws could be abused to most likely overwrite any component of the method to fly underneath the radar and continue to be persistent, not to point out render the module untrustworthy.

Upcoming WEBINARShield In opposition to Insider Threats: Grasp SaaS Security Posture Administration

Apprehensive about insider threats? We have got you protected! Be a part of this webinar to discover useful techniques and the secrets of proactive security with SaaS Security Posture Administration.

Join Right now

Impacted equipment include 1756-EN2T, 1756-EN2TK, 1756-EN2TXT, 1756-EN2TP, 1756-EN2TPK, 1756-EN2TPXT, 1756-EN2TR, 1756-EN2TRK, 1756-EN2TRXT, 1756-EN2F, 1756-EN2FK, 1756-EN3TR, 1756-EN3TRK, 1756-EN4TR, 1756-EN4TRK, and 1756-EN4TRXT. Patches have been accessible by Rockwell Automation to deal with the issues.

“The sort of obtain presented by CVE-2023-3595 is very similar to the zero-day used by XENOTIME in the TRISIS attack,” the industrial cybersecurity company stated. “Equally permit for arbitrary firmware memory manipulation, even though CVE-2023-3595 targets a communication module responsible for managing network instructions. However, their effects is the exact.”

TRISIS, also acknowledged as TRITON, is an industrial control programs (ICS) malware that has been previously observed concentrating on Schneider Electric’s Triconex protection instrumented method (SIS) controllers utilised in oil and gas facilities. A petrochemical plant in Saudi Arabia was identified as a victim in late 2017, in accordance to Dragos and Mandiant.

Dragos cautioned it learned an “unreleased exploit capability leveraging these vulnerabilities” that are affiliated with an identified country-point out team and that as of mid-July 2023, “there was no evidence of exploitation in the wild and the targeted victim businesses and field verticals were mysterious.”

“In addition to the compromise of the susceptible module alone, the vulnerability could also let an attacker to influence the industrial course of action alongside with the underlying critical infrastructure, which may end result in doable disruption or destruction,” Tenable researcher Satnam Narang mentioned of CVE-2023-3595.

Identified this post attention-grabbing? Stick to us on Twitter  and LinkedIn to browse more special material we post.


Some components of this posting are sourced from:
thehackernews.com

Previous Post: «u.s. government agencies' emails compromised in china backed cyber attack U.S. Government Agencies’ Emails Compromised in China-Backed Cyber Attack
Next Post: Fake PoC for Linux Kernel Vulnerability on GitHub Exposes Researchers to Malware fake poc for linux kernel vulnerability on github exposes researchers»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • 6 Steps to 24/7 In-House SOC Success
  • Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
  • 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
  • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.