
![]() |
Charlotte Stonestreet
Managing Editor |
Home> | AUTOMATION | >Security | >Security holes in SCADA product now patched |
Security holes in SCADA product now patched
29 April 2014
As reported on our website recently, IT security data and analytics company Rapid7 has identified and disclosed vulnerabilities in the Windows-based industrial production control system CENTUM CS 3000 R3 sold by Yokogawa Electric, originally released in 1998.
Over 7600 of those systems for plant operation and monitoring have been sold worldwide, including power plants, chemical and petrochemical plants in Europe, the USA and Asia.
The vulnerabilities, if exploited, could allow could allow an attacker to perform a denial of service (DoS) or even potentially get system privileges to execute arbitrary code with user and system privileges. Hackers could also take screenshots to gather information about running projects or hijack SCADA communications.
Rapid7 offers advance capabilities for vulnerability management, penetration testing, endpoint controls assessment, and incident detection and investigation – helping to improve risk management, simplify compliance and stop threats faster.
Rapid7 warns that the vulnerabilities could affect any organisation running CENTUM CS3000 engineering projects. They recommend upgrading the software, and protecting access to engineering projects by making sure they can only be accessed remotely through VPN or gateway products. During its investigation, which was conducted by Rapid7's Juan Vazquez and independent researcher Julian Vilas Diaz, some CENTUM installations were identified that were vulnerable and directly connected the Internet. Yokogawa was alerted to the vulnerabilities in December 2013.
In March 2014, Yokogawa created a patch (CENTUM CS 3000 R3.09.50) to mitigate the reported vulnerabilities. To activate the patch software, the computer needs to be rebooted. Older versions of the CENTUM CS 3000 will need to be updated to the latest version of R3.09.50 before installing the patch software. Yokogawa also suggests all customers introduce appropriate security measures to the overall system, not just for the vulnerabilities identified.
- New method of manufacturing micromotor windings
- BBC to give all year 7 pupils free pocket-sized computer
- Kawasaki Heavy Industries to expand production in China
- Offshore survival training matters long before the system is switched on
- Transport platform for healthcare
- Robots-as-a-service for manufacturing industry
- Pump up the savings
- Washdown motor selection
- 3D printed steel smart bridge
- Don't risk digitalisation paralysis
- Insight Into Security Threats
- Secure Network Interoperation
- SAFETY & SECURITY - STRANGE BEDFELLOWS
- Siemens extends TIA Portal engineering framework
- Partnership To Enhance Industrial Control Systems Security
- GAMBICA forms industrial network security group
- Infosecurity: stop throwing rocks at each other
- Secure data handling process
- Rising risk of cyber security attacks
- Scalable safety integration for small applications