Sign In

Communications of the ACM

ACM TechNews

Security Company Warns of Mitsubishi Industrial Control Vulnerabilities


View as: Print Mobile App Share: Send by email Share on reddit Share on StumbleUpon Share on Hacker News Share on Tweeter Share on Facebook
Mitsubishi programmable logic controller

Mitsubishi safety PLC owners are asked to assess their security posture and take general mitigations until patches are available.

Researchers at cybersecurity firm Nozomi Networks Labs have identified five vulnerabilities in Mitsubishi's safety programmable logic controllers (PLCs), centered on the authentication implementation of the MELSOFT communication protocol. Although Mitsubishi has developed a strategy to patch the vulnerabilities, the researchers stress that software updates take longer to deploy for safety PLCs or medical devices.

"Depending on the type of device and regulatory framework, the certification procedure could be required for each individual software update," the researchers say in a blog post. More than one vendor likely was affected by the issues, they say.

Among other things, the researchers found that attackers could reuse session tokens generated after successful authentication. "If we chain together some of the identified vulnerabilities, several attack scenarios emerge," they say.

However, attackers are unable to access the MELSOFT authentication or authenticated packets in cleartext, the researchers say.

From ZDNet
View Full Article

 

Abstracts Copyright © 2021 SmithBucklin, Washington, DC, USA


 

No entries found