ICS-CERT Warns of Serious Flaws In Tridium SCADA Software 34
Trailrunner7 writes "The DHS and ICS-CERT are warning users of some popular Tridium Niagara AX industrial control system software about a series of major vulnerabilities in the applications that are remotely exploitable and could be used to take over vulnerable systems. The bugs, discovered by researchers Billy Rios and Terry McCorkle, are just the latest in a series of vulnerabilities found in the esoteric ICS software packages that control utilities and other critical systems. The string of bugs reported by Rios and McCorkle include a directory traversal issue that gives an attacker the ability to access files that should be restricted. The researchers also discovered that the Niagara software stores user credentials in an insecure manner. There are publicly available exploits for some of the vulnerabilities."
Of course, since it's SCADA... (Score:1)
...these aren't machines you're hooking to the Internet. Right?
Re: (Score:3, Funny)
Of course they aren't connected to the internet. They're connected to each other by unencrypted radio links.
Re: (Score:3)
Of course they aren't connected to the internet. They're connected to each other by unencrypted radio links.
They do have checksums on the packets so that someone's garage door opener doesn't open a valve.
Re: (Score:2)
Your valve opened my garage door you insensitive clod
Did they steal your Maserati?
Re: (Score:2)
Yeah, but a bunch of modbus stuff going over a radio link isn't exactly hard to spoof, ya know.
Re: (Score:2)
Why do I get images of Trinity blowing up a power station in that Matrix movie that sucked so bad?
Re: (Score:3)
Re: (Score:1)
You fool!
This is clearly Doc Ock back in action.
Poor Spiderman is probably too busy formatting his computer after catching a rootkit off Bing. :(
Re: (Score:1, Informative)
It's not really SCADA, it's different. SCADA is from Siemens, this is different and the Niagara Framework is used in places beyond big facilities such as power plants and factories. The Niagra framework reaches offices buildings, hospitals, airports and more.
http://www.securityweek.com/niagara-vulnerabilities-put-office-buildings-airports-hospitals-risk [securityweek.com]
That being said, this warning was originally issued back in July with ICS-CERT not really adding anything new in this warning.
-M
Re:Of course, since it's SCADA... (Score:5, Informative)
SCADA is a general-use acronym, Supervisory Control And Data Acquisition. It has been in common use in the industrial control system world for at least 20 years. It is not a term specific to Siemens or any other control systems vendor. And it is not incorrect to apply the acronym to application areas like building automation; there can be a fair amount of overlap in system architecture, devices, & communication protocols between building automation and industrial manafacturing automation.
Source: 10 years experience as a industrial control systems engineer.
Re: (Score:3, Insightful)
Mod Superflex up = Informative.
Every platform that I've ever worked with in 20+ years of industrial networking (yeah, I remember TISTAR over coax) has demonstrated it's own unique vulnerabilities that the vendors arrogantly ignore. The diligent engineer/integrator must, regardless of platform or deployment, be aware and take reasonable precautions.
Automation as an industry shares the same classic security handicaps as the internet and telecom industries: Careless users, badly written code, and low-budget ma
Re: (Score:2)
Uh, yeah. Not always. The issue is the software guys don't understand how the blasted plant works and tend to come up with unworkable solutions. I have seen this many times. This is why we have automation engineers who understand both. I have seen software engineers produce horrendous quality production software that has people's lives depending on it, simply because they don't understand what they're doing. They don't understand failsafe. To a hardware guy a off signal is no voltage or a broken wire. To a
Re:Of course, since it's SCADA... (Score:5, Informative)
Actually, it's designed to be web-facing [tridium.com].
Niagara^AX is a software framework and development environment that solves the challenges associated with building Internet-enabled products, device-to-enterprise applications and distributed Internet-enabled automation systems.
Worse, this is a laughably simple exploit of the web-facing interface [threatpost.com]:
By default, the Tridium Niagara AX software is not configured to deny access to restricted parent directories... An attacker could exploit this vulnerability by sending a specially crafted request to the Web server running on Port 80/TCP
"The system insecurely stores user authentication credentials, which are susceptible to interception and retrieval. User authentication credentials are stored in the Niagara station configuration file, config.bog, which is located in the root of the station folder"
In other words, it's about as simple as GET /../config.bog HTTP/1.1
Big Suprise (Score:4, Insightful)
Re: (Score:2)
You're an idiot.
Re: (Score:2)
Not really. They're often designed around OPC which uses DCOM security. It is obsolete, but there is security. It simply gets disabled because DCOM is a disaster to work with. They're pushing OPC UA and OPC Xi now to fix this.
A load of.. (Score:1)
Re: (Score:1)
SCADA software and POS software has many similarities.
After All (Score:4, Insightful)
They would know.
Directory Traversal? Noobs. (Score:2)
Re: (Score:2)
So, industrial software companies are using retail/home user sounding names for their products?
I've always thought of Tridium as a building automation system, not an industrial SCADA system. While I may be wrong in that I have never seen it considered for any large scale industrial plant.
Same Warning Was Issued Back in July (Score:4, Informative)
This alert is actually not very new and dates back to July. ICS-CERT re-releases things all the time in order to update small things and be sre people see an update, no matter how minor. Here is the original that came out in July:
http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-12-195-01.pdf [us-cert.gov] [us-cert.gov] -- It's pretty much identical from what I can see.
It's not a skirt, it's a kil...it's a skirt, nm. (Score:1)
I like the descripton: "This system is stuck in the 90s. We didn't even bother looking at the ActiveX stuff."
All I could think of was that Next Gen' episode where an old Klingon ship timewarps from the past:
Picard: Data, is there any way we can see through their cloaking device?
Data: Cloaking devices of the time were leaky in the gamma range.
Picard: Good. Make it our ho.
Java running under Windows (Score:2)
Java running under Windows
Crime (Score:3)
This is why we should only use US vendors! (Score:1)
Well, imagine what this Slashdot article and discussion thread would be like, if Tridium was China based, instead of operating out of Richmond, VA...