12
ICS SECURITY 2017 IN REVIEW

Read ICS security: 2017 in review - Positive Technologies · According to recent research,11 several thousand Lantronix interface converters are accessible on ... As in prior years,

Embed Size (px)

Citation preview

ICS

SEC

URI

TY20

17 IN

REV

IEW

ICS SECURITY: 2017 IN REVIEW

2

CONTENTS

Introduction .........................................................................................................................................................................................3

Abbreviations used .........................................................................................................................................................................3

Vulnerabilities in ICS components .........................................................................................................................................4

Internet accessibility of ICS components ..........................................................................................................................7

Conclusion ......................................................................................................................................................................................... 12

ICS SECURITY: 2017 IN REVIEW

3

INTRODUCTION

Manufacturing facilities and critical infrastructure, such as energy and transportation, have fallen victim to more and more cyberattacks in recent years. Loss of USD $300 million by shipping giant Maersk,1 interruptions in production at Renault and Nissan plants,2 and a ransomware attack on the San Francisco public transit system3 are only a few recent examples that have made headlines.

Securing industrial control systems (ICS) is a critical factor in ensuring the overall information se-curity of critical facilities and infrastructure. Many efforts have been made to promote ICS secu-rity: governments are developing regulatory frameworks, computer emergency response teams (CERT) are issuing bulletins, and ICS vendors are gaining awareness that vulnerabilities in their products can cause loss of lucrative contracts4 and even lives.

Despite these efforts—and in the face of mounting incident costs and concern—security at most industrial facilities has shown minimal improvement since the Stuxnet attacks of 2010, as illustrat-ed in this report.

The problem is worsened by the tendency to connect ICS equipment to the Internet, which is likely to intensify with the advent of the Fourth Industrial Revolution. Such connections set the stage for attacks by hackers from anywhere in the world, even without direct physical access to target equipment.

Nowadays, almost any advanced Internet user can look up the IP addresses of network equipment used on ICS networks (such as switches, interface converters, and gateways) with the help of pub-licly available search engines. When this equipment is hacked, building systems and operations are at high risk. In 2017, we found that vulnerabilities in such equipment are becoming an increas-ingly common occurrence.5

This report, our fourth on the subject, describes findings by Positive Technologies regarding vul-nerabilities in ICS components and their prevalence on Internet-connected systems, and how this situation has evolved over recent years.

ABBREVIATIONS USED

DCS—distributed control systems

HMI—human–machine interface

ICS—industrial control system

LAN—local area network

PLC—programmable logic controller

RAP—remote access point

RTU—remote terminal unit

SCADA—supervisory control and data acquisition

1 bloomberg.com/news/articles/2017-08-16/maersk-misses-estimates-as-cyberattack-set-to-hurt-third-quarter

2 businessinsider.com/renault-nissan-production-halt-wannacry-ransomeware-attack-2017-5

3 theguardian.com/technology/2016/nov/28/passengers-free-ride-san-francisco-muni-ransomeware

4 In December 2017, oil transporter Transneft announced that it would cease use of Schneider Electric equipment due to multiple vulnerabilities jeopardizing the company’s cybersecurity

5 Examples of attacks leveraging network equipment will be described in a separate report, which will be released at a later date on ptsecurity.com

ICS SECURITY: 2017 IN REVIEW

4

VULNERABILITIES IN ICS COMPONENTS

Research methodology

Information was drawn from publicly available sources, such as vulnerability knowledge bases, vendor advisories, exploit databases and packs, research papers, and posts on security websites and blogs.6

The following vulnerability knowledge bases were used:

+ ICS-CERT (ics-cert.us-cert.gov)+ NVD (nvd.nist.gov), CVE (cve.mitre.org)+ Positive Research Center (securitylab.ru/lab)+ Schneider Electric Cybersecurity Support Portal7

+ Siemens Product CERT (siemens.com/cert)

The severity of vulnerabilities in ICS components was assessed based on the Common Vulnerability Scoring System (CVSS) version 3 (first.org/cvss).

Our assessment of disclosed vulnerabilities did not attempt to cover every single vendor of indus-trial automation equipment, instead focusing on larger and more prominent companies.

Trends

The number of new vulnerabilities disclosed in 2017 increased compared to the prior year. As of publication of this report, information about 197 vulnerabilities of major manufacturers had been published. However, this number could still increase due to responsible disclosure policies, since vulnerabilities often are not published until after they have been fixed. For example, 30 vulnerabil-ities in Moxa equipment were detected in 2016 but disclosed only in 2017.

Vulnerabilities by vendor

The top spots saw a reversal of positions. The previous leader, Siemens, yielded first place to Schneider Electric, whose 47 component vulnerabilities disclosed in 2017 exceeded the compa-ny’s total for 2016 (5) by almost ten times. Also notable is the increased number of security flaws in Moxa industrial network equipment, with twice as many (36) as in the previous year (18).

6 digitalbond.com, scadahacker.com, immunityinc.com/products/canvas, exploit-db.com, rapid7.com/db

7 schneider-electric.com/b2b/en/support/cybersecurity/report-an-incident.jsp

Number of new vulnerabilities found in ICS components

0

2013

2014

2015

2016

25 50 75 100 125 150 175 200 225

158

181

212

115

2017

197

ICS SECURITY: 2017 IN REVIEW

5

Vulnerabilities by component type

The core trend we see is the growing number of new vulnerabilities in industrial network equip-ment. Security flaws were detected in Moxa (36), Hirschmann (4), and Phoenix Contact (4) prod-ucts. While the number of vulnerabilities in network equipment disclosed in 2016 was a third less than in SCADA/HMI/DCS devices,8 the subsequent 12 months narrowed that gap.

8 ICS components for supervision and monitoring

Number of vulnerabilities disclosed in 2017 by major ICS vendors

Other

Westermo

SpiderControl

ABB

Hirschmann (Belden)

Phoenix Contact

Honeywell

Rockwell Automation

SMA

0 10 20 30 40 50

Siemens

Advantech

Moxa

Schneider Electric

14

3

3

4

4

4

8

11

14

32

17

47

36

Localization of new vulnerabilities in ICS components

SCADA/HMI/DCS

Network equipment

PLC/RAP

Software

Other

28%

31%8%

14%

19%

ICS SECURITY: 2017 IN REVIEW

6

CVSS scores of vulnerabilities

0%

Attack Complexity

Attack Vector

Priveleges Required

Confidentiality

Integrity

Availability

User Interaction

Scope

10% 20% 30% 40% 50% 60% 70% 80% 90% 100%

79.2%

4.6%

15.7%

0.5%

High

Low

High

Low

None

Physical

Local

Adjacent

Network

80.7%

19.3%

6.1%

77.7%

16.2%

High

Low

None

56.8%

19.3%

23.9%

High

Low

None

44.7%

36.5%

18.8%

High

Low

None

48.7%

34.5%

16.8%

Required

None 77.7%

22.3%

Changed

Unchanged 85.8%

14.2%

The most common types of vulnerabilities were Information Disclosure, Remote Code Execution, and Buffer Overflow. In 2016, the first two also topped the list, and the third one was Denial of Service.

Types of vulnerabilities in ICS components

Remote Code Execution

Information Disclosure

Protection Bypass

Buffer Overflow

Cross-Site Request Forgery

Cross-Site Scripting

Denial of Service

SQL Injection

Path Traversal

Privilege Escalation

Other17%

24%

12%

2%

10%

8%

9%

6%

5%

4%

3%

According to CVSS v3 metrics, the situation remained almost unchanged as compared with 2016. Most vulnerabilities detected in 2017 can be exploited remotely without needing to obtain any privileges in advance.

ICS SECURITY: 2017 IN REVIEW

7

Severity of new vulnerabilities

More than half of the newly reported vulnerabilities are of critical and high severity, based on CVSSv3 scoring. The share of critical vulnerabilities increased by 3% compared with 2016.

Vulnerabilities by severity level

High

Critical

Low

Medium

41%

20%5%

34%

INTERNET ACCESSIBILITY OF ICS COMPONENTS

Research methodology

To collect information on the online accessibility of ICS components, Positive Technologies used passive methods only. To obtain the research materials, we scanned ports of Internet-accessible components using publicly accessible search engines: Google, Shodan (shodan.io), and Censys (censys.io).

Passive techniques for gathering data about the Internet accessibility of ICS components have several limitations:

+ Shodan scans a limited number of ports and performs scanning of the Internet from specific IP addresses, which are blacklisted by some firewall vendors and administrators. Therefore, data from Google and Censys was used to expand the scope of assessment.

+ In many cases, it was not possible to determine product versions, because the necessary infor-mation was not given in the banners returned by host servers.

This data was then specially analyzed to identify which results corresponded to ICS equipment. Our experts created a database of ICS identifiers for determining product and vendor based on a device’s banner.

ICS SECURITY: 2017 IN REVIEW

8

Prevalence

The research revealed 175,632 ICS components accessible online.

Looking at the protocols used by the detected ICS components, the most common protocol was HTTP, which is consistent with recent years. The Fox protocol was also very popular: it is used in Niagara Framework products and most commonly seen in automation systems for buildings, facilities, and data centers. These systems control air conditioning, power supply, telecommunica-tions, alarms, lighting, security cameras, and other important building systems. Such automation systems often contain vulnerabilities9 and have already been attacked in the wild.10

9 ics-cert.us-cert.gov/advisories/ICSA-12-228-01A

10 info.publicintelligence.net/FBI-AntisecICS.pdf

Number of Internet-accessible ICS components, by protocol

Other

DNP3

S7 Communication

IEC 60870-5-104

PCWorx

Telnet

RedLion

FINS

FTP

Modbus

0 10,000 20,000 30,000 40,000 50,000 60,000 70,000

CODESYS

Lantronix Discovery Protocol

BACnet

Ethernet/IP

FOX

HTTP

SNMP

401

320

337

410

752

897

976

1,098

1,643

1,953

9,937

13,717

25,631

39,168

66,587

6,668

1,910

ICS SECURITY: 2017 IN REVIEW

9

Changes in Russia

In 2017, Russia jumped up three positions to number 28 in the list of countries. The number of detected ICS components grew from 591 in 2016 to 892 in 2017. These changes suggest a growing danger caused by an increasing number of Internet-accessible ICS components located in Russia.

Number of Internet-accessible ICS components, by country

Other

Hong Kong

Brazil

Sweden

Norway

South Korea

Belgium

Australia

Czech Republic

Netherlands

0 10,000 20,000 30,000 40,000 50,000 60,000 70,000

Spain

China

Italy

Canada

France

Germany

United Kingdom

42,077

1,938

1,990

2,118

2,314

2,483

2,494

2,705

2,851

4,112

4,285

5,858

7,371

7,759

13,242

United States

64,287

4,240

3,508

Geographic distribution

The U.S. has held the top spot for some years now, increasing its commanding lead of Internet-accessible components by 10% in the last year to around 42% of the total. Germany took second place (6%), the same as in the previous year. Rounding out the top three is France (5%); China fell from third to sixth place.

ICS SECURITY: 2017 IN REVIEW

10

Statistics: vendors and products

First place is occupied by Honeywell, the owner of Tridium and Niagara Framework. Some Niagara products retain their old brand, which is why Tridium is listed separately from Honeywell in this report.

The second most popular vendor is Lantronix. This California-based company manufactures de-vices designed to provide remote access to equipment via the Internet.

According to recent research,11 several thousand Lantronix interface converters are accessible on the Internet. Almost half of these devices expose passwords that could be used to connect via Telnet. Our research confirms this fact: we detected 12,120 accessible Lantronix devices in total, a number of which were vulnerable.

Despite their auxiliary role, these devices can pose a significant hazard to operations when connect-ed to the Internet. Interface converters connect ICS components to each other, so any malfunction or failure on their part can cause loss of remote control and management. For example, during a cy-berattack on the Ukrainian energy grid,12 the attackers remotely disrupted the functioning of Moxa converters. As a result, utility operators could no longer connect to field devices at substations or remotely control substation switches.

As in prior years, Niagara Framework is the software most commonly found on Internet-accessible equipment. Apart from Lantronix interface converters, which hold second place, Moxa converters are also close to the top.

11 bleepingcomputer.com/news/security/thousands-of-serial-to-ethernet-devices-leak-telnet-passwords/

12 boozallen.com/content/dam/boozallen/documents/2016/09/ukraine-report-when-the-lights-went-out.pdf

Number of Internet-accessible ICS components, by vendor

SpiderControl

SoftPLC

WAGO

Sofrel Lacroix

Bosch

Westermo

3S-Smart Software Solutions

Echelon

Tridium

0 5,000 10,000 15,000 20,000 25,000 30,000

Moxa

Rockwell Automation

Siemens

Beck IPC

SMA

Lantronix

Honeywell

Schneider Electric

1,121

1,160

1,267

1,619

1,672

1,850

2,156

2,437

2,672

4,232

4,759

5,594

6,069

9,362

9,399

12,120

26,813

ICS SECURITY: 2017 IN REVIEW

11

Internet-accessible ICS components, by product

Niagara AX station

Niagara Web

WebRTU

Sofrel S500

Westermo MRD-310

Bosch Security Systems

3S-Smart Software Solutions Device

i.LON SmartServer

Siemens Building Technologies HMI Panel

Moxa Nport

0 5,000 10,000 15,000 20,000 25,000 30,000

1,300

1,372

1,383

1,619

1,647

1,672

1,953

2,220

4,310

4,589

Allen-Bradley Device

4,906

IPC@CHIP

9,362

Sunny WebBox

9,399

Lantronix Serial Converter

9,937

Niagara Framework

24,858

Types of ICS components

The distribution of Internet-accessible components by types remained almost the same. The only difference from 2016 is a significant increase in the share of network equipment.13

13 This type includes components that can be classified under multiple types, such as Niagara Framework multifunction products.

Type of ICS component Share in 2017 Share in 2016

SCADA/DCS/HMI and/or PLC/RAP (RTU)13 14.2% 13.6%

PLC/RAP (RTU) 13.2% 12.9%

Network equipment 12.9% 5.1%

SCADA/DCS/HMI 7.1% 7.8%

Electrical measuring equipment 6.3% 5.2%

Other 46.5% 55.5%

Share of ICS components accessible on the Internet, by type

ICS SECURITY: 2017 IN REVIEW

12

CONCLUSION

The 2017 data shows an increasing number of vulnerabilities publicly acknowledged by major ICS vendors. More than half of the detected vulnerabilities are of critical or high severity.

The number of Internet-accessible ICS components is growing. The majority of them were detect-ed in the countries with the highest levels of industrial automation (U.S., Germany, France, Canada, Italy, and China).

An increase in the number of known vulnerabilities and Internet-accessible ICS components allows attackers to conduct a wider range of attacks, which can cause very tangible impacts. Responding to sophisticated attacks on ICS components requires large amounts of preparation and planning. Before the first line of code is ever written, ICS developers must design the security mechanisms necessary to protect ICS components from attacks.

To identify potential attack vectors and develop an effective protection system, companies should perform regular ICS security audits and deploy industrial cybersecurity incident management solutions.

As always, observing the following basic security guidelines goes a long way toward ensuring protection:

+ Segregate ICS operational networks from the enterprise LAN and external networks.+ Limit physical access to ICS networks and components.+ Enforce a strict password policy.+ Properly configure network equipment and firewall filtering rules.+ Protect privileged accounts.+ Minimize privileges of users and services.+ Use antivirus software.+ Regularly install updates to operating systems and applications.

ICS_Security_A4.ENG.0002.02.JAN.26.2018

[email protected] ptsecurity.com

About Positive Technologies

Positive Technologies is a leading global provider of enterprise security solutions for vulnerability and compliance management, incident and threat analysis, and application protection. Commitment to clients and research has earned Positive Technologies a reputation as one of the foremost authorities on Industrial Control System, Banking, Telecom, Web Application, and ERP security, supported by recognition from the analyst community. Learn more about Positive Technologies at ptsecurity.com.

© 2018 Positive Technologies. Positive Technologies and the Positive Technologies logo are trademarks or registered trademarks of Positive Technologies. All other trademarks mentioned herein are the property of their respective owners.