Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

1/14/2020
09:30 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Industrial Control System Features at Risk

How some ICS product functions can be weaponized by altering their configurations.

A new analysis of industrial control systems (ICS) running in the networks of oil and gas, power generation, refining and chemicals, pulp and paper, and mining industries sheds light on how some legitimate and deeply rooted product features and functions can actually threaten their security.

In many cases, these purpose-built functions embedded in systems can be exploited by malicious attackers by merely changing easily adjusted configurations and settings; malware isn't necessarily required to do so, according to Mark Carrigan, chief operating office of PAS Global. Carrigan's firm studied some 10,000 of its customers' ICS systems to pinpoint features that he describes as "delicate by design" with easily abused configuration capabilities. 

It's a spin on the well-known "insecure by design" issue associated with these systems: Security vulnerabilities as well as the lack of security controls in the design of many OT products have been the subject of research for some time. But Carrigan points out that some product features, too, can easily be reconfigured and weaponized.

Not only do many of these systems predate today's cyberthreats, but some of the security-challenged features were built into the systems to make engineers' jobs easier and so they could perform their tasks quickly, according to Carrigan. They can't easily be updated, and even removing some of these weaknesses can, in many cases, cause a ripple effect of disruption in the system and production.

While sophisticated or potentially damaging attacks on ICS networks to date have been relatively rare and difficult to pull off without knowledge of a plant's processes as well as the ICS systems within it, security experts say nation-state attackers, via cyber espionage campaigns, are increasingly gaining knowledge to sabotage a plant's operation via a cyberattack. Stuxnet was the first wakeup call for the industrial sector. Most recently was Triton/Trisis, which in 2017 shut down the safety instrumentation system at a petrochemical plant in Saudi Arabia. 

Understanding the processes beneath the control systems could be a deadly combination for a malicious hacker able to change the configuration of the OT assets, Carrigan says. "That's the next landscape for attackers," he says.

'Tip of the Iceberg'
Carrigan won't name names of the affected vendors PAS found in its analysis, but some of the exposed features span multiple brands of OT equipment. Of the 10,000 industrial systems, there were some 380,000 total known vulnerabilities with published CVEs, most of which were Microsoft Windows-related. He will present his findings next week at the S4x20 ICS security conference in Miami.

"This is just the tip of the iceberg. There are tons of these out there," Carrigan says.

Dale Peterson, CEO of Digital Bond, a control systems research and consulting firm that runs S4, says Carrigan's study provides another level of insecure-by-design issues. Specifically, some of them include features that are required for components to communicate. To actually fix these issues would entail simultaneously upgrading a large number of components and weeks of production outage, he explains.

"Also, many of these 'features' are hidden or known only to the team deploying the ICS," Peterson notes.

Many of the security-challenged features PAS is highlighting are well-known by the vendors in question, according to Carrigan. Most of the fallout he has seen with those features so far has been with mistakes and inadvertent misconfigurations by the operators themselves, not malicious hackers.

One feature that spans all vendors' control systems products is a parameter or setting generally known as the output characteristic. This control function parameter is a binary setting that determines, for example, the flow rate of air or gas in a valve. If the flow controller is set for 100 and the current flow is 80, it will open the valve to reach 100, for example, he says. "If I just reverse that setting — just switch it ... it's a simple thing to do — that valve opening is going to close. I've [then] reversed the action of the output characteristic," he explains.

Another feature specific to one vendor's control system product — which it recently patched — is a command in the human machine interface's (HMI) graphics files that could allow an attacker to gain administrative control of the entire DCS network, Carrigan says. This feature is for engineers or designers to create a command for an operator, but if an attacker got hold of it, he or she could land admin privileges. It even bypasses any set Windows admin privileges, he says.

An additional feature at risk is an HTML weakness in most HMIs built in the past 10 years, according to PAS's findings. These HMIs use a free format of HTML for graphics design, according to Carrigan. "If you have HTML, you can inject code and do almost anything you want — change flow control settings, no problem. Do SQL injections in the configuration database, no issue there," he says.

PAS also found a setting in one vendor's control system for balancing computing loads for a flow-control indicator process. By "mixing up" the calculations of the flow indicator and the flow controller on the CPU, an attacker could wreak havoc on the operation. "There's nothing in the system to prevent you from setting those things wrong. So at a minimum I can cause production problems by changing a bunch of these settings," or even overload the CPU, he says.

Another "delicate" feature they found: one vendor's ICS system that uses a single, hard-coded system engineer username and password that is stored in its configuration database. The password is hashed, but Carrigan says it's a very simple and guessable hash. "Once I've [the attacker] figured it out, I know for every single system, I can access that hash and access that system," he explains. The password can't be changed because it's "designed into" the product.

Damon Small, technical director of the NCC Group, says the threat model has changed significantly for the ICS sector, and attacks are becoming more common. But the real-world impact of making security changes like patching or other moves that take operations offline even for a short period of time often deter any major security changes by operators. Small says once when he recommended an operator to patch monthly for Windows flaws, the operator told him that taking those systems offline for just four hours would cost his organization $350,000 in outage time.

"Operators know very well the inefficiencies introduced when you start messing with control systems," Small explains.

What to Do
How do OT operators protect their plants from their own systems, especially if patching may be off the table in some cases?

Adopting configuration management, especially for the most critical systems and assets, is one way to thwart an attack via "delicate" features, according to Carrigan. That way only the changes you allow can take place, for instance, he says.

Passive network monitoring can also catch anomalous traffic and behavior, notes NCC Group's Small, who is also a founding member of the Operational Technology Cyber Security Alliance. "If you see something other than what you were expecting, that could an indicator of something having gone wrong. But this assumes you understand what your normal traffic looks like — what your baseline is," he notes, which requires analysis.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "6 Unique InfoSec Metrics CISOs Should Track in 2020."

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/17/2020
Cybersecurity Bounces Back, but Talent Still Absent
Simone Petrella, Chief Executive Officer, CyberVista,  9/16/2020
Meet the Computer Scientist Who Helped Push for Paper Ballots
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5421
PUBLISHED: 2020-09-19
In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter.
CVE-2020-8225
PUBLISHED: 2020-09-18
A cleartext storage of sensitive information in Nextcloud Desktop Client 2.6.4 gave away information about used proxies and their authentication credentials.
CVE-2020-8237
PUBLISHED: 2020-09-18
Prototype pollution in json-bigint npm package < 1.0.0 may lead to a denial-of-service (DoS) attack.
CVE-2020-8245
PUBLISHED: 2020-09-18
Improper Input Validation on Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11....
CVE-2020-8246
PUBLISHED: 2020-09-18
Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-W...