Home / Threat Intelligence bulletins / CISA releases security advisory regarding two ICS vulnerabilities

Target Industry

Industry sectors affiliated with critical national infrastructure (CNI).

Overview

The Cybersecurity and Infrastructure Security Agency (CISA) has released an advisory pertaining to two Industrial Control System (ICS) vulnerabilities.

The first relates to three Schneider Electric EcoStruxure Power Monitoring Expert and Power Operation Products systems and is tracked as CVE-2023-5391 (CVSSv3.1 score: 9.8). The second, tracked as CVE-2023-29464, has a lower CVSSv3.1 severity level of 8.2 and has been discovered within Rockwell FactoryTalk Linx systems.

Impact

  • Successful exploitation of CVE-2023-5391 would almost certainly allow a threat actor to gain remote code execution capabilities on target systems.
  • Successful exploitation of CVE-2023-29464 would almost certainly allow an unauthenticated threat actor to read data from memory via crafted malicious packets. It has been assessed to be highly likely that such compromise would result in a denial-of-service (DoS) to FactoryTalk Linx over the common industrial protocol.

Vulnerability Detection

Both ICS vendors have released security updates regarding the respective vulnerabilities. As such, previous product versions of the affected systems remain vulnerable to potential exploitation.

Affected Products

Schneider Electric (CVE-2023-5391):

  • EcoStruxure Power Monitoring Expert: All versions prior to Hotfix-145271
  • EcoStruxure Power Operation with Advanced Reports: All versions prior to application of Hotfix-145271
  • EcoStruxure Power SCADA Operation with Advanced Reports: All versions prior to Hotfix-145271.

Rockwell Automation (CVE-2023-29464):

  • FactoryTalk Linx: v6.20 and prior.

Containment, Mitigations & Remediations

It is strongly recommended that the mitigation strategies disclosed by both vendors are adhered to and applied as a matter of urgency. These have been outlined below:

Schneider Electric (CVE-2023-5391):

Further, it is also strongly recommended that the following Schneider Electric cyber security best practices are implemented:

  • Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network
  • Install physical controls so that no unauthorised personnel can access industrial control components
  • Place all controllers in locked cabinets and do not set them to “Program” mode
  • Avoid connecting programming software to any network other than that intended for the system
  • Scan all methods of mobile data exchange with the isolated network
  • Do not allow mobile devices that have connected to any other network other the intended network to connect to the safety or control networks without proper sanitation
  • Minimise network exposure for all control systems and ensure that they are not accessible from the internet
  • Utilise secure methods, such as virtual private networks (VPNs) for remote access purposes.

Rockwell Automation (CVE-2023-29464):

It is strongly recommended that the following Rockwell Automation and CISA cyber security best practices mitigate against the risk of exploitation:

  • Install the security patches for the respective versions
  • Minimise network exposure for all control systems, ensuring they are not accessible from the internet
  • Locate control system networks and remote devices behind firewalls and isolate them from business networks
  • Utilise secure methods, such as VPNs for remote access purposes.

Indicators of Compromise

No specific Indicators of Compromise (IoCs) are available currently.

Threat Landscape

Schneider Electric and Rockwell Automation occupy a significant portion of the power conversion equipment manufacturing and industrial automation market shares, respectively. Products from both vendors are used extensively by organisations within industry sectors closely affiliated with CNI. Within this context, nation-state threat actors almost certainly view organisations with operational protocols involving these products as prime targets as they seek to compromise the critical infrastructure of these regions to meet state geopolitical objectives.

Threat Group

No attribution to specific threat actors or groups has been identified at the time of writing.

Mitre Methodologies

CVE-2023-5391 – Common Weakness Enumeration:
CWE-502 – Deserialization of Untrusted Data

CVE-2023-29464 – Common Weakness Enumeration:
CWE-20 – Improper Input Validation

Further Information

 

An Intelligence Terminology Yardstick to showing the likelihood of events