• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Users of IoT products from three major vendors at risk of DDoS attacks, data leaks

You are here: Home / General Cyber Security News / Users of IoT products from three major vendors at risk of DDoS attacks, data leaks

At least 9 vulnerabilities in the approach 3 foremost IoT distributors utilised to carry out the open platform conversation (OPC) network protocol designed situations that could probably expose products consumers to denial-of-assistance (DoS) attacks, remote code execution, and sensitive details leakage.

The three IoT sellers – Softing Industrial Automation GmbH, Kepware PTC, and Matrikon Honeywell – all presented fixes for their respective items right after security organization Claroty privately disclosed them throughout 2020.

OPC capabilities as the intermediary of operational technology (OT) networks, guaranteeing operability involving industrial management programs (ICS) and proprietary products, such as programmable logic controllers (PLCs) responsible for the proper operation of subject products. Standardized interaction protocols these types of as OPC and its specs guarantee that management and oversight of products and procedures can happen from a centralized server.

✔ Approved Seller by TheCyberSecurity.News From Our Partners
Avast Premium Security 2021

Protect yourself against all threads using AVAST Premium Security. AVAST Ultimate Suite protects your Windows, macOS and your Android via Avast Premium.

Get AVAST Premium Security with 60% discount from our partner: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The researchers urged susceptible consumers to update quickly to the most recent versions if the impacted products. The Industrial Control Procedure Cyber Crisis Reaction Crew (ICS-CERT) also has released advisories, warning users of the impacted goods about the challenges and supplying update and mitigation information and facts.

Claroty researchers cautioned the attack surfaces will increase and mentioned organizations must examine their respective implementations for weaknesses. In the meantime, the security community must also support enhanced security and analysis into undiscovered vulnerabilities and protocol shortcomings.

Today’s report comes as a important reminder that industrial handle devices rely on program and these programs are open to abuse by cybercriminals, reported Joseph Carson, chief security scientist and Advisory main facts security officer at Thycotic.

“For OPC program this means it should be hardened and saved on segmented secure networks with solid privileged entry security controls,” Carson mentioned. “A defense-in-depth strategy for ICS is important to safeguarding them in opposition to unauthorized obtain so that even when security vulnerabilities are exposed the risks on abusing them is pretty limited.”

The vulnerabilities learned incorporate the following:

Softing Industrial Automation GmbH

CVE-2020-14524: Heap-Primarily based Buffer Overflow (CWE-122)

CVE-2020-14522: Uncontrolled Useful resource Use (CWE-400)

Kepware PTC

CVE-2020-27265: Stack-centered buffer overflow (CWE-121)

CVE-2020-27263: Heap-based buffer overflow (CWE-122)

CVE-2020-27267: Use-right after free (CWE-416)

Matrikon Honeywell OPC DA Tunneler

CVE-2020-27297: Heap overflow due to integrer overflow (CWE-122)

CVE-2020-27299: Data leak thanks to OOB browse (CWE-125)

CVER-2020-27274: Incorrect check out for unusual or outstanding disorders (CWE-754)

CVE-2020-27295: Uncontrolled useful resource consumption (CWE-400)

 


Some components of this article are sourced from:
www.scmagazine.com

Previous Post: «Biden’s Pick As White House Cyber Czar Provides Critical Federal Speed of White House cyber appointments should make CISOs ‘a bit more confident’

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Users of IoT products from three major vendors at risk of DDoS attacks, data leaks
  • Speed of White House cyber appointments should make CISOs ‘a bit more confident’
  • 2.28M MeetMindful Daters Compromised in Data Breach
  • San Francisco Law Firm Investigating PupBox Data Breach
  • Mr. Double Website Operator Convicted
  • Deloitte Acquires Root9B
  • Does cybersecurity need its own Fauci?
  • Cisco DNA Center Bug Opens Enterprises to Remote Attack
  • SonicWall Breach Stems from ‘Probable’ Zero-Days
  • Russian spy agencies warn of US cyber retaliation

Copyright © TheCyberSecurity.News, All Rights Reserved.