Feeds

Siemens squashes Stuxnet-like bugs in SCADA kit

Loading DLL files willy-nilly? What could POSSIBLY go wrong?

Build a business case: developing custom apps

Siemens has corked vulnerabilities in its industrial control kit similar to those exploited by the infamous Stuxnet worm.

Security bugs on the German manufacturer's Simatic Step 7 and Simatic PCS 7 SCADA control software created a means to load malicious dynamic-link library (DLL) files. This is the type of flaw exploited by the Stuxnet worm, which used DLL hijacking techniques in Step 7 software to infect systems controlling high-speed centrifuges at Iranian nuclear facilities. It is not clear, however, whether or not this specific bug was used in the Stuxnet attack.

Siemens said that previous versions of its Step 7 and PCS 7 software allowed the loading of DLL files into the Step 7 project folder without validation – giving the malware free rein to attack the SCADA systems. The firm fixed the flaw by introducing a mechanism that rejected the loading of DLL files into the folder – effectively blocking the path to possible infection, an advisory by the Industrial Control Systems Cyber Emergency Response Team (ISC-CERT) explains [PDF].

A second update [PDF], also released on Monday, deals with a SQL server authentication security flaws in Siemen’s Simatic WinCC and Simatic PCS 7 software. Left unfixed, the vulnerability created a means for hackers to get into targeted systems using default credentials.

Siemens issued a series of patches in the wake of the discovery of the Stuxnet worm back in 2010 but this failed to placate critics, including Ralph Langner, who claimed last year that many shortcomings in Siemens' supervisory control and data acquisition (SCADA) systems remained unpatched.

Stuxnet used an array of Windows-based zero-day flaws, configuration weaknesses and security bugs in SCADA systems to infect a system and spread across it. So even though the main Windows-based attack vector was patched relatively quickly, concerns remain about the security of industrial controls software, which is often overlooked when it comes to patching. ®

Next gen security for virtualised datacentres

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Scale data protection with your virtual environment
To scale at the rate of virtualization growth, data protection solutions need to adopt new capabilities and simplify current features.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?