• Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
What's Hot

Motorola Edge 60 Fusion review: The high-end budget phone to beat

January 14, 2026

A Knight of the Seven Kingdoms is not the show I was expecting

January 14, 2026

Motorola Moto G06 Power review: Bigger (battery) is better

January 13, 2026
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
Behind The ScreenBehind The Screen
Home»Security»Over 50 OT:ICEFALL Vulnerabilities Risk Numerous Industrial Devices
Security

Over 50 OT:ICEFALL Vulnerabilities Risk Numerous Industrial Devices

July 1, 2022No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Latest Hacking News
Share
Facebook Twitter LinkedIn Pinterest Email

Researchers have discovered greater than 50 totally different safety vulnerabilities affecting a whole lot of commercial units. Recognized as OT:ICEFALL, these vulnerabilities primarily exist in operational expertise (OT) industrial units from 10 totally different distributors. Therefore, industries utilizing susceptible OT units should apply mitigation methods to keep away from potential exploits.

About OT:ICEFALL Vulnerabilities Threatening Industrial Units

In accordance with a latest report from Forescout Vedere Labs, quite a few operational units from the next ten distributors are riddled with OT:ICEFALL vulnerabilities. The researchers named the issues “Icefall” after the second cease on Everest after Base Camp.

Relating to the susceptible units and distributors, the researchers have shared the next record. It mentions solely 9 distributors, because the tenth vendor uncovered to 4 vulnerabilities continues to be beneath disclosure.

  • Bently Nevada: 3700, TDI tools (situation displays)
  • Emerson: DeltaV and Ovation (distributed management system), OpenBSI (engineering workstation), ControlWave, BB 33xx, ROC (distant terminal unit), Fanuc, PACsystems (programmable logic controller)
  • Honeywell: Pattern IQ (constructing controller), Security Supervisor FSC (security instrumented system), Experion LX (distributed management system), ControlEdge (distant terminal unit), Saia Burgess PCD (programmable logic controller)
  • JTEKT: Toyopuc (programmable logic controller)
  • Motorola: MOSCAD, ACE IP gateway (distant terminal unit), MDLC (protocol), ACE1000 (distant terminal unit), MOSCAD Toolbox STS (engineering workstation)
  • Omron: SYSMAC Cx sequence, Nx sequence (programmable logic controller)
  • Phoenix Contact: ProConOS (logic runtime)
  • Siemens: WinCC OA (SCADA)
  • Yokogawa: STARDOM (programmable logic controller)

The researchers have shared an in depth technical report sharing their evaluation. Briefly, they found 56 totally different vulnerabilities that predominantly fall into the next classes.

  • Distant code execution
  • Denial of service (DoS)
  • File/firmware/configuration manipulation
  • Authentication bypass
  • Compromise of credentials

Supply: Forescout

These “insecure-by-design” vulnerabilities demand utmost consideration for the reason that prison hackers are all the time trying to find such bugs to compromise industries through malware, comparable to TRITON, Industroyer2, and others. As said of their publish,

Abusing all these insecure-by-design, native capabilities of OT tools is the popular modus operandi of real-world industrial management system (ICS)… These vulnerabilities, and the confirmed want for attackers to take advantage of them, reveal the necessity for strong, OT-aware community monitoring and deep-packet-inspection (DPI) capabilities.

Really helpful Mitigations

The susceptible units have an effect on the economic management methods globally. Therefore, industries should scan their infrastructure to detect the existence of susceptible tools and patch the bugs. Some mitigation methods that researchers advocate embody,

  • Uncover and stock susceptible units
  • Implement segmentation controls and correct community hygiene
  • Monitor progressive patches launched by affected system distributors
  • Monitor all community site visitors for malicious packets
See also  Elden Ring publisher Bandai Namco confirms reports it was hacked

Furthermore, the researchers additionally spotlight the numerous disadvantage of certifying insecure-by-design merchandise that may impart a false sense of innate safety. Thus, companies should attempt their greatest to obtain secure-by-design merchandise. On the similar time, distributors ought to enter most efforts towards product safety. Collectively, all entities should work in the direction of creating an setting specializing in “strong” as a substitute of “merely useful” safety controls.

Source link

Devices Industrial Numerous OTICEFALL risk vulnerabilities
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

FBI Says Hackers Now Targeting Connected Devices in Your Home

June 11, 2025

How WWDC25 Blurred the Lines Between Apple Devices

June 10, 2025

The Best Chargers for your Apple Devices, every price point (2025)

January 21, 2025

‘GrayKey’ Forensic Tool Has Limited Unlocking Ability for iOS 18 Devices – iDrop News

November 21, 2024
Add A Comment

Comments are closed.

Editors Picks

If Musk Starts Firing Twitter’s Security Team, Run

October 29, 2022

Research shows data security tools fail against ransomware 60% of the time

July 1, 2022

Apple iPhone 15 review

October 25, 2023

A Light Green iPhone 15 is a Possibility

August 29, 2023

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Motorola Edge 60 Fusion review: The high-end budget phone to beat

A Knight of the Seven Kingdoms is not the show I was expecting

Motorola Moto G06 Power review: Bigger (battery) is better

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2026 behindthescreen.fr - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.