Aik Designs

——- Creative Solutions ——-

Siemens PLCs Using RCE: A Vulnerability In Industrial Control Systems

3 min read
Siemens PLCs Using RCE

In today’s world, Industrial Control Systems (ICS) are critical infrastructure components that are used in a wide range of industries including manufacturing, energy, and transportation. These systems play a vital role in ensuring the efficient operation of industrial processes, and their disruption can cause severe damage to both physical infrastructure and public safety. However, with the increasing connectivity of these systems to the internet, the risk of cyber attacks is also increasing. Recently, there has been a lot of concern about a vulnerability in Siemens PLCs that can be exploited using Remote Code Execution (RCE) techniques. In this article, we will explore this vulnerability and its implications for industrial control systems.

Siemens PLCs are widely used in industrial control systems due to their reliability, performance, and ease of use. However, a vulnerability in the firmware of these PLCs can be exploited to execute arbitrary code remotely. This vulnerability was discovered by cybersecurity researchers in 2020 and has been named “RCE vulnerability in Siemens S7 CPUs” (CVE-2020-15782). This vulnerability can allow an attacker to take complete control of a Siemens PLC and the industrial process it controls.

The RCE vulnerability in Siemens PLCs affects the firmware of the CPUs used in these systems. The affected CPUs are used in various Siemens PLCs, including the S7-1200, S7-1500, and ET200SP. The vulnerability is caused by a flaw in the firmware that allows an attacker to execute arbitrary code remotely. This can be achieved by sending specially crafted packets to the PLC over the network. Once the attacker has gained control of the PLC, they can modify the industrial process it controls, potentially causing severe damage to physical infrastructure and endangering public safety.

The RCE vulnerability in Siemens PLCs is a significant concern for industrial control systems as these systems are increasingly connected to the internet. Attackers can exploit this vulnerability remotely, without the need for physical access to the industrial control system. This makes it easier for attackers to launch attacks on these systems, potentially causing significant damage.

MRO Electric, a leading supplier of industrial automation equipment and services, has highlighted the importance of addressing this vulnerability. The company has emphasized the need for organizations to update their Siemens PLCs to the latest firmware versions, which address this vulnerability. In addition, MRO Electric has recommended implementing additional security measures to protect industrial control systems from cyber attacks.

One of the security measures recommended by MRO Electric is implementing a network segmentation strategy. Network segmentation involves dividing the industrial control system network into smaller sub-networks, each with its own security measures. This can help contain the spread of cyber attacks, limiting their impact on the entire industrial control system. MRO Electric has also recommended implementing access control measures, such as two-factor authentication and strict password policies, to prevent unauthorized access to industrial control systems.

In conclusion, the RCE vulnerability in Siemens PLCs is a significant concern for industrial control systems. This vulnerability can be exploited remotely, allowing attackers to take control of a Siemens PLC and the industrial process it controls. Organizations that use Siemens PLCs in their industrial control systems should take immediate steps to update their firmware and implement additional security measures, such as network segmentation and access control measures. As highlighted by MRO Electric, failure to address this vulnerability could result in severe damage to physical infrastructure and endanger public safety.