Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Trend Micro Research Reveals Serious Vulnerabilities in Critical Industry 4.0-IT Interfaces

Protocol gateways prove critical for smart industrial environments

Trend Micro Incorporated, a global leader in cybersecurity solutions, released research revealing a new class of security vulnerabilities in protocol gateway devices that could expose Industry 4.0 environments to critical attacks.

Also known as protocol translators, protocol gateways allow machinery, sensors, actuators and computers that operate in industrial facilities to talk to each other and to IT systems that are increasingly connected to such environments.

Recommended AI News: Drift Expands Beyond Conversational Marketing

“Protocol gateways rarely get individual attention, but their importance to Industry 4.0 environments is significant and can be singled out by attackers as a critical weak link in the chain,” said Bill Malik, vice president of infrastructure strategy for Trend Micro. “By responsibly disclosing nine zero-day vulnerabilities with the affected vendors, Trend Micro is leading the way with industry-first research that will help to make global OT environments more secure.”

Trend Micro Research analyzed five popular protocol gateways focused around translation of Modbus, one of the most widely used OT protocols globally.

Recommended AI News: pSemi Expands Portfolio with Two High-Performance Digital Step Attenuators

Related Posts
1 of 4,841

As detailed in the new report, vulnerabilities and weaknesses found in these devices include:

  • Authentication vulnerabilities allowing unauthorized access
  • Weak encryption implementations allowing decryption of configuration databases
  • Weak implementation of authentication mechanisms resulting in disclosure of sensitive information
  • Denial of Service conditions
  • Flaws in the translation function that could be used to issue stealth commands to sabotage operations

Attacks leveraging such weaknesses could allow malicious hackers to view and steal production configurations and sabotage key industrial processes by manipulating process controls, camouflaging malicious commands with legitimate packets, and denying process control access.

Recommended AI News: SecurityMetrics Summit Brings New Ideas and Innovation to Data Security and Compliance

The report makes several key recommendations for vendors, installers and end users of industrial protocol gateways:

  • Consider the design of products carefully before selection. Ensure they have adequate packet filtering capabilities, so that devices aren’t prone to translation errors or denial of service
  • Do not rely on a single point of control for the security of the network. Combine ICS firewalls with traffic monitoring for improved security
  • Spend time on configuring and protecting the gateway — use strong credentials, disable unnecessary services and enable encryption where supported
  • Apply security management to protocol gateways as any other critical OT asset, i.e. regular assessments for vulnerabilities/misconfiguration, and regular patching

Recommended AI News: Nuestra Vision Launches on Pluto TV for US Mexicans and Overall Hispanic Market

Comments are closed, but trackbacks and pingbacks are open.