Check the status of CVEs. Learn More.
Keeping your systems up 100% of the time requires live patching. Our solutions will align strongly with your risk, compliance, and operational uptime requirements.
TuxCare is trusted by the most innovative companies across the globe.
Learn about TuxCare's modern approach to reducing cybersecurity risk with Blogs, White Papers, and more.
Continually increasing Cybersecurity, stability, and availability of Linux servers and open source software since 2009.
TuxCare provides live security patching for numerous industries. Learn how TuxCare is minimizing risk for companies around the world.
2x a month. No spam.
December 14, 2022 - TuxCare expert team
Vedere Labs researchers recently discovered three new security flaws in a long list of flaws collectively tracked as OT:ICEFALL.
The flaws are said to affect operational technology (OT) products from two German vendors, Festo and CODESYS, and can be used to attack automated industrial controllers and a popular piece of software used to program millions of smart devices in critical infrastructure, and could impact device manufacturers across various industrial sectors.
These bugs are tracked as CVE-2022-4048, and they affect CODESYS V3 version 3.5.18 and manipulate it logically. The CVE-2022-3079 vulnerability, which affects Festo CPX-CEC-C1 and CPX-CMXX Codesys V2 controllers, allows unauthenticated, remote access to critical webpage functions, potentially resulting in a denial of service. CVE-2022-3270 Festo controllers using the FGMC protocol allow for unauthenticated network controller reboot.
They all point to either an insecure-by-design approach, in which manufacturers include dangerous functions that can be accessed without authentication, or a poor implementation of security controls, such as cryptography.
Application encryption is provided by the CODESYS V3 runtime environment to ensure that download code and boot applications are encrypted. The CODESYS runtime is used by hundreds of device manufacturers worldwide, including Festo. CODESYS V3 prior to version 184.108.40.206 was discovered to use weak cryptography for download code and boot applications, allowing attackers to decrypt and manipulate protected code with ease by brute forcing session keys.
The Festo CPX-CEC-C1 and CPX-CMXX controllers, on the other hand, allow unauthenticated remote access to critical webpage functions. Anyone with network access to a controller can navigate to a hidden web page on the controller’s filesystem, causing the controller to reboot and potentially causing a denial of service.
Furthermore, Festo controllers that use the Festo Generic Multicast (FGMC) protocol allow for unauthenticated controller reboots and other sensitive operations. The Festo Field Device Tool, which communicates via FGMC, can achieve the same effect. The PLC Browser tool, which allows operators to issue commands, can also be used to reboot controllers without requiring authentication.
Recommendations to Reduce Risk Due to the difficulty of patching or replacing OT devices due to their mission-critical nature, Forescout recommends that organizations implement mitigation strategies that prioritize securing their increased attack surface based on up-to-date threat intelligence.
Besides that, the research discovered that a number of Festo devices, including its CPX-CEC-C1 controllers, were shipped with CODESYS configurations that make them vulnerable to a pair of older, previously disclosed software flaws.
The sources for this piece includes an article in SCMedia.
Learn About Live Patching with TuxCare
According to CyberArk researchers, GPT-based models like ChatGPT can be...
Malicious hackers have started exploiting a critical vulnerability CVE-2022-44877 in...
Deep Instinct researchers reported that RATs like StrRAT and Ratty...
According to CircleCI’s CTO, Rob Zuber, CircleCI is working with...
A remote attacker could exploit multiple vulnerabilities in four Cisco...
In a notable IcedID malware attack, the assailant impacted the...