http://www.theregister.co.uk/2011/03/22/scada_exploits_released/ 

By Dan Goodin in San Francisco
The Register
22nd March 2011

The security of software used to control hardware at nuclear plants, gas 
refineries and other industrial settings is coming under renewed scrutiny as 
researchers released attack code exploiting dozens of serious vulnerabilities 
in widely used programs.

The flaws, which reside in programs sold by Siemens, Iconics, 7-Technologies, 
Datac, and Control Microsystems, in many cases make it possible for attackers 
to remotely execute code when the so-called supervisory control and data 
acquisition software is installed on machines connected to the internet. Attack 
code was released by researchers from two separate security camps over the past 
week.

“SCADA is a critical field but nobody really cares about it,” Luigi Auriemma, 
one of the researchers, wrote in an email sent to The Register. “That's also 
the reason why I have preferred to release these vulnerabilities under the 
full-disclosure philosophy.”

The vulnerability dump includes proof-of-concept code for at least 34 
vulnerabilities in widely used SCADA programs sold by four different vendors. 
Auriemma said the majority of the bugs allow code execution, while others allow 
attackers to access sensitive data stored in configuration files and one makes 
it possible to disrupt equipment that uses the software. He included a complete 
rundown of the vulnerabilities and their corresponding PoC code in a post 
published on Monday to the Bugtraq mail list.

It came six days after a Moscow-based security firm called Gleg announced the 
availability of Agora SCADA+, which attempts to collect virtually all known 
SCADA vulnerabilities into a single exploit pack. The 22 modules include 
exploits for 11 zero-day vulnerabilities, said the company's Yuriy Gurkin in an 
email. It's not clear how much the package costs.

Gurkin said Gleg's website has come under sustained web attacks shortly after 
releasing the SCADA exploit pack.

“We have tried to switch to ddoshostingsolutions.com provider but in just 3 
days were out of 500 GB traffic limit,” he said. “Currently trying to solve 
this.”

The vulnerability of SCADA systems had long been theorized, but it wasn't until 
last year that the world got an object lesson on just how susceptible they 
could be to attack. In July, researchers reported the discovery of a computer 
worm that attacked SCADA software sold by Siemens. Research later showed that 
the underlying Stuxnet exploit amounted to a “search-and-destroy weapon” built 
to take out Iran's Bushehr nuclear reactor.

SCADA software often runs on extremely old systems that are difficult to 
replace without causing disruptions to critical equipment. As a result, 
installing patches and upgrades is frequently avoided despite the obvious 
security benefits. ®
_______________________________________________
Infowarrior mailing list
[email protected]
https://attrition.org/mailman/listinfo/infowarrior

Reply via email to