• Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
What's Hot

Nothing Phone (4a) Pro review: Daringly different

March 19, 2026

9 Hidden iPhone Features You Should Be Using in 2026

March 18, 2026

4 Features That Make Your iPhone More Than an App Launcher

March 14, 2026
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
Behind The ScreenBehind The Screen
Home»Security»Over 50 OT:ICEFALL Vulnerabilities Risk Numerous Industrial Devices
Security

Over 50 OT:ICEFALL Vulnerabilities Risk Numerous Industrial Devices

July 1, 2022No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Latest Hacking News
Share
Facebook Twitter LinkedIn Pinterest Email

Researchers have discovered greater than 50 totally different safety vulnerabilities affecting a whole lot of commercial units. Recognized as OT:ICEFALL, these vulnerabilities primarily exist in operational expertise (OT) industrial units from 10 totally different distributors. Therefore, industries utilizing susceptible OT units should apply mitigation methods to keep away from potential exploits.

About OT:ICEFALL Vulnerabilities Threatening Industrial Units

In accordance with a latest report from Forescout Vedere Labs, quite a few operational units from the next ten distributors are riddled with OT:ICEFALL vulnerabilities. The researchers named the issues “Icefall” after the second cease on Everest after Base Camp.

Relating to the susceptible units and distributors, the researchers have shared the next record. It mentions solely 9 distributors, because the tenth vendor uncovered to 4 vulnerabilities continues to be beneath disclosure.

  • Bently Nevada: 3700, TDI tools (situation displays)
  • Emerson: DeltaV and Ovation (distributed management system), OpenBSI (engineering workstation), ControlWave, BB 33xx, ROC (distant terminal unit), Fanuc, PACsystems (programmable logic controller)
  • Honeywell: Pattern IQ (constructing controller), Security Supervisor FSC (security instrumented system), Experion LX (distributed management system), ControlEdge (distant terminal unit), Saia Burgess PCD (programmable logic controller)
  • JTEKT: Toyopuc (programmable logic controller)
  • Motorola: MOSCAD, ACE IP gateway (distant terminal unit), MDLC (protocol), ACE1000 (distant terminal unit), MOSCAD Toolbox STS (engineering workstation)
  • Omron: SYSMAC Cx sequence, Nx sequence (programmable logic controller)
  • Phoenix Contact: ProConOS (logic runtime)
  • Siemens: WinCC OA (SCADA)
  • Yokogawa: STARDOM (programmable logic controller)

The researchers have shared an in depth technical report sharing their evaluation. Briefly, they found 56 totally different vulnerabilities that predominantly fall into the next classes.

  • Distant code execution
  • Denial of service (DoS)
  • File/firmware/configuration manipulation
  • Authentication bypass
  • Compromise of credentials

Supply: Forescout

These “insecure-by-design” vulnerabilities demand utmost consideration for the reason that prison hackers are all the time trying to find such bugs to compromise industries through malware, comparable to TRITON, Industroyer2, and others. As said of their publish,

Abusing all these insecure-by-design, native capabilities of OT tools is the popular modus operandi of real-world industrial management system (ICS)… These vulnerabilities, and the confirmed want for attackers to take advantage of them, reveal the necessity for strong, OT-aware community monitoring and deep-packet-inspection (DPI) capabilities.

Really helpful Mitigations

The susceptible units have an effect on the economic management methods globally. Therefore, industries should scan their infrastructure to detect the existence of susceptible tools and patch the bugs. Some mitigation methods that researchers advocate embody,

  • Uncover and stock susceptible units
  • Implement segmentation controls and correct community hygiene
  • Monitor progressive patches launched by affected system distributors
  • Monitor all community site visitors for malicious packets
See also  British Army’s YouTube and Twitter accounts were hacked to promote crypto scams

Furthermore, the researchers additionally spotlight the numerous disadvantage of certifying insecure-by-design merchandise that may impart a false sense of innate safety. Thus, companies should attempt their greatest to obtain secure-by-design merchandise. On the similar time, distributors ought to enter most efforts towards product safety. Collectively, all entities should work in the direction of creating an setting specializing in “strong” as a substitute of “merely useful” safety controls.

Source link

Devices Industrial Numerous OTICEFALL risk vulnerabilities
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

FBI Says Hackers Now Targeting Connected Devices in Your Home

June 11, 2025

How WWDC25 Blurred the Lines Between Apple Devices

June 10, 2025

The Best Chargers for your Apple Devices, every price point (2025)

January 21, 2025

‘GrayKey’ Forensic Tool Has Limited Unlocking Ability for iOS 18 Devices – iDrop News

November 21, 2024
Add A Comment

Comments are closed.

Editors Picks

Netflix launches gaming service exclusively on Android, but iOS support is ‘on the way’

July 4, 2022

Could the iPad Get a Mac Menu Bar in iPadOS 19?

April 25, 2025

Apple Watch Ultra 3 review: Incremental, but still superb

February 4, 2026

Apple claims a new iMessage can alert you if state-sponsored spies are eavesdropping

December 17, 2022

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Nothing Phone (4a) Pro review: Daringly different

9 Hidden iPhone Features You Should Be Using in 2026

4 Features That Make Your iPhone More Than an App Launcher

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2026 behindthescreen.fr - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.