On March 31 2022, two significant security vulnerabilities were disclosed involving Rockwell Automation programmable logic controllers (PLCs) and software. Exploitation of these vulnerabilities could allow a remote attacker to inject malicious code into the affected systems.
Consequences of the exploitation of these vulnerabilities
In case the attack is successful, it will allow stealthily to modify PLC automation processes or user programs. This could lead to serious consequences including:
In view of the consequences, it is important to quickly take measures to correct the impacted systems.
Details about the affected vulnerabilities
CVE-2022-1161 (critical severity, score 10): concerns an existing vulnerability on the ControlLogix, CompactLogix and GuardLogix control systems from Rockwell. The score of 10 assigned to this vulnerability indicates that it can be exploited very easily from distance. It is therefore urgent to fix.
CVE-2022-1159 (HIGH severity, score of 7.7). This vulnerability concerns the Studio 5000 Logix Designer application and it allows to inject malicious code into the user program without him being aware of it. The exploitation of this vulnerability can lead to the downloading of a malicious program on the PLC, thus altering its operation. The score of 7.7 indicates that the vulnerability can be easily exploited. Therefore, quick measures must also be taken in this case.
Vulnerability mitigation/correction measures
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has identified the list of impacted systems and applications. It has also made recommendations to mitigate these two vulnerabilities. Please consult them here: CVE-2022-1161 and CVE-2022-1159.
How can StreamScan help you manage your cybersecurity in your OT infrastructure?
StreamScan is specialized in operational cybersecurity and manages the security of several manufacturing companies on a daily basis (IT systems, IoT, PLC, etc.).
If you need help, contact one of our experts.
To subscribe to our newsletter, follow this link.
