• Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
What's Hot

Sihoo Doro C300 and C300 Pro V2 office chair reviews: Affordable, comfortable ergonomics

May 2, 2026

Xiaomi 17 Ultra review: A balancing act

May 1, 2026

6 Common Mistakes to Avoid When Selling a Used CPU (2026 Guide)

April 30, 2026
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
Behind The ScreenBehind The Screen
Home»Security»Over 50 OT:ICEFALL Vulnerabilities Risk Numerous Industrial Devices
Security

Over 50 OT:ICEFALL Vulnerabilities Risk Numerous Industrial Devices

July 1, 2022No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Latest Hacking News
Share
Facebook Twitter LinkedIn Pinterest Email

Researchers have discovered greater than 50 totally different safety vulnerabilities affecting a whole lot of commercial units. Recognized as OT:ICEFALL, these vulnerabilities primarily exist in operational expertise (OT) industrial units from 10 totally different distributors. Therefore, industries utilizing susceptible OT units should apply mitigation methods to keep away from potential exploits.

About OT:ICEFALL Vulnerabilities Threatening Industrial Units

In accordance with a latest report from Forescout Vedere Labs, quite a few operational units from the next ten distributors are riddled with OT:ICEFALL vulnerabilities. The researchers named the issues “Icefall” after the second cease on Everest after Base Camp.

Relating to the susceptible units and distributors, the researchers have shared the next record. It mentions solely 9 distributors, because the tenth vendor uncovered to 4 vulnerabilities continues to be beneath disclosure.

  • Bently Nevada: 3700, TDI tools (situation displays)
  • Emerson: DeltaV and Ovation (distributed management system), OpenBSI (engineering workstation), ControlWave, BB 33xx, ROC (distant terminal unit), Fanuc, PACsystems (programmable logic controller)
  • Honeywell: Pattern IQ (constructing controller), Security Supervisor FSC (security instrumented system), Experion LX (distributed management system), ControlEdge (distant terminal unit), Saia Burgess PCD (programmable logic controller)
  • JTEKT: Toyopuc (programmable logic controller)
  • Motorola: MOSCAD, ACE IP gateway (distant terminal unit), MDLC (protocol), ACE1000 (distant terminal unit), MOSCAD Toolbox STS (engineering workstation)
  • Omron: SYSMAC Cx sequence, Nx sequence (programmable logic controller)
  • Phoenix Contact: ProConOS (logic runtime)
  • Siemens: WinCC OA (SCADA)
  • Yokogawa: STARDOM (programmable logic controller)

The researchers have shared an in depth technical report sharing their evaluation. Briefly, they found 56 totally different vulnerabilities that predominantly fall into the next classes.

  • Distant code execution
  • Denial of service (DoS)
  • File/firmware/configuration manipulation
  • Authentication bypass
  • Compromise of credentials

Supply: Forescout

These “insecure-by-design” vulnerabilities demand utmost consideration for the reason that prison hackers are all the time trying to find such bugs to compromise industries through malware, comparable to TRITON, Industroyer2, and others. As said of their publish,

Abusing all these insecure-by-design, native capabilities of OT tools is the popular modus operandi of real-world industrial management system (ICS)… These vulnerabilities, and the confirmed want for attackers to take advantage of them, reveal the necessity for strong, OT-aware community monitoring and deep-packet-inspection (DPI) capabilities.

Really helpful Mitigations

The susceptible units have an effect on the economic management methods globally. Therefore, industries should scan their infrastructure to detect the existence of susceptible tools and patch the bugs. Some mitigation methods that researchers advocate embody,

  • Uncover and stock susceptible units
  • Implement segmentation controls and correct community hygiene
  • Monitor progressive patches launched by affected system distributors
  • Monitor all community site visitors for malicious packets
See also  VCs shouldn’t confuse risk management with not funding diverse founders – DailyTech

Furthermore, the researchers additionally spotlight the numerous disadvantage of certifying insecure-by-design merchandise that may impart a false sense of innate safety. Thus, companies should attempt their greatest to obtain secure-by-design merchandise. On the similar time, distributors ought to enter most efforts towards product safety. Collectively, all entities should work in the direction of creating an setting specializing in “strong” as a substitute of “merely useful” safety controls.

Source link

Devices Industrial Numerous OTICEFALL risk vulnerabilities
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

FBI Says Hackers Now Targeting Connected Devices in Your Home

June 11, 2025

How WWDC25 Blurred the Lines Between Apple Devices

June 10, 2025

The Best Chargers for your Apple Devices, every price point (2025)

January 21, 2025

‘GrayKey’ Forensic Tool Has Limited Unlocking Ability for iOS 18 Devices – iDrop News

November 21, 2024
Add A Comment

Comments are closed.

Editors Picks

iOS 14.5: Siri no longer defaults to a female voice, two new choices added

July 8, 2022

‘Wordle’ today, August 1: Answer, hints, help for Wordle #408

August 1, 2022

Genshin Impact’s 3.0 update takes us to the dreamless region of Sumeru in August

August 15, 2022

Microsoft wants Activision because of mobile gaming opportunities, says Phil Spencer

August 28, 2022

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Sihoo Doro C300 and C300 Pro V2 office chair reviews: Affordable, comfortable ergonomics

Xiaomi 17 Ultra review: A balancing act

6 Common Mistakes to Avoid When Selling a Used CPU (2026 Guide)

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2026 behindthescreen.fr - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.