Siemens software targeted by Stuxnet still full of holes
Details from a cancelled Defcon presentation were revealed on Thursday in Seoul
IDG News Service - Software made by Siemens and targeted by the Stuxnet malware is still full of other dangerous vulnerabilities, according to Russian researchers whose presentation at the Defcon security conference earlier this year was cancelled following a request from the company.
Sergey Gordeychik, CTO of Moscow-based Positive Technologies, was scheduled to give a presentation in July at Defcon, but it was abruptly pulled after Siemens asked for more time to patch its WinCC software.
WinCC is a type of SCADA (Supervisory Control And Data Acquisition) system, which is used to manage a variety of industrial processes in factories and energy utilities. The type of software underpins much of what's deemed critical infrastructure by countries and has in recent years received closer examination by computer security experts.
Iran used WinCC to control centrifuges for refining uranium. Weaknesses in the software -- combined with vulnerabilities in Microsoft's Windows OS -- allowed the malicious software called Stuxnet to disrupt the centrifuges, an act of sabotage linked to the U.S. and Israel.
Gordeychik agreed to suspend his presentation at Defcon, but on Thursday presented an overview of his WinCC research at the Power of Community security conference in Seoul on Thursday with Gleb Gritsai, a colleague on the company's penetration testing team. They withheld the specific details of the vulnerabilities since Siemens has not released patches.
The team has found more than 50 vulnerabilities in WinCC's latest version, so many that Siemens has worked out a roadmap to patch them all, Gordeychik said in an interview. Most are problems that would allow an attacker to take over a WinCC system remotely.
Still, "it's easy to find a vulnerability in WinCC," Gordeychik said. "You can just point at it."
Gritsai showed how, when an industrial system operator is using the same browser to access both the open Internet and WinCC's web interface, a vulnerability can be exploited to obtain login credentials for the back-end SCADA network.
Several cross-site scripting flaws have been found in WebNavigator, Siemens'A web-based human-machine interface that allows a WinCC-controlled operation to run with Internet Explorer.
It's not unusual for organizations that have WinCC's web interface installed on the desktop to also use the browser on the Internet, Gritsai said. For example, an employee may be chatting on Facebook at the same time they're managing a nuclear plant, he said.
Siemens has been very receptive to Positive Technologies' findings, Gordeychik said. With Stuxnet, Siemens appears to be experiencing the same sort of security wake-up call that Microsoft had when pernicious malware such as the Code Red worm appeared in 2001.
"I'm really surprised," Gordeychik said. "Other SCADA vendors don't want to talk about security at all."
Positive Technologies also released two security tools on Thursday relating to WinCC. The first is a module called WinCC Harvest for the Metasploit penetration testing tool that allows an attacker to collect information from a SQL database within a Siemens SIMATIC WinCC SCADA system.
The other tool, called PLCScan, is used to scan for programmable logic controllers, which are the electronic devices used to control machines in SCADA systems.
Send news tips and comments to firstname.lastname@example.org. Follow me on Twitter: @jeremy_kirk
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts