工控系统是关键基础设施的重要组成部分,也是国家的重要战略资源。随着工业互联网的发展和工控系统的数字化转型,工控安全漏洞可能会对生产线、基础设施和整个产业链造成严重的影响。本文着重于2023年度工控行业十大安全漏洞的梳理,以攻促防,期望助力提升工业企业的漏洞防御能力。
-
KingHistorian: version 35.01.00.05
-
1734-AENT/1734-AENTR Series C: Versions 7.011 and prior -
1734-AENT/1734-AENTR Series B: Versions 5.019 and prior -
1738-AENT/ 1738-AENTR Series B: Versions 6.011 and prior -
1794-AENTR Series A: Versions 2.011 and prior -
1732E-16CFGM12QCWR Series A: Versions 3.011 and prior -
1732E-12X4M12QCDR Series A: Versions 3.011 and prior -
1732E-16CFGM12QCR Series A: Versions 3.011 and prior -
1732E-16CFGM12P5QCR Series A: Versions 3.011 and prior -
1732E-12X4M12P5QCDR Series A: Versions 3.011 and prior -
1732E-16CFGM12P5QCWR Series B: Versions 3.011 and prior -
1732E-IB16M12R Series B: Versions 3.011 and prior -
1732E-OB16M12R Series B: Versions 3.011 and prior -
1732E-16CFGM12R Series B: Versions 3.011 and prior -
1732E-IB16M12DR Series B: Versions 3.011 and prior -
1732E-OB16M12DR Series B: Versions 3.011 and prior -
1732E-8X8M12DR Series B: Versions 3.011 and prior -
1799ER-IQ10XOQ10 Series B: Versions 3.011 and prior
-
Experion PKS: versions prior to R520.2
-
Experion LX: versions prior to R520.2
-
Experion PlantCruise: versions prior to R520.2
-
Desigo CC product family V5.0: All versions -
Desigo CC product family V5.1: All versions -
Desigo CC product family V6: All versions -
Desigo CC product family V7: All versions
-
VisiLogic: Versions prior to 9.9.00
罗克韦尔自动化 Rockwell Automation FactoryTalk View Machine Edition存在输入验证不当漏洞。成功利用此漏洞可能允许攻击者使用特制的恶意数据包或使用自制库绕过安全检查来远程执行代码。该漏洞影响版本为:
-
FactoryTalk View Machine Edition: v13.0 -
FactoryTalk View Machine Edition: v12.0 and prior
-
1756-EN2T Series A: versions 5.008 and prior -
1756-EN2T Series A: version 5.028 -
1756-EN2T Series B: versions 5.008 and prior -
1756-EN2T Series B: version 5.028 -
1756-EN2T Series C: versions 5.008 and prior -
1756-EN2T Series C: version 5.028 -
1756-EN2T Series D: versions 11.002 and prior -
1756-EN2TK Series A: versions 5.008 and prior
通用电气GE Digital Proficy Historian存在使用备用路径或通道绕过身份验证、无限制上传危险类型文件、不当访问控制、密码弱编码等漏洞。成功利用这些漏洞可能会导致设备在访问后崩溃、导致缓冲区溢出情况并允许远程执行代码。GE Digital 报告这些漏洞影响以下 Proficy Historian 产品:
-
Proficy Historian v7.0 及更高版本 -
其他 GE 软件产品,包括上面未列出的 GE Digital 和 Proficy 产品不受影响 。
-
使用强密码且具备单独的访问级密码,通过应用客户端进行验证。 -
迁移并升级到V17或更高版本,以启用所有模拟S7-1200/1500 PLC(包括SW控制器)的新的基于TLS的通信协议(请参阅Siemens Security Bulletin SSB-898115)。 -
根据西门子的工业安全运营指南,进行工业系统环境配置的深入防御。
1.Black Hat Europe 2023 - SIMATIC S7-1500 SW 控制器中传统PG/PC和 HMI 通信的详细信息
https://www.siemens.com/cert/advisories
2.报告丨天际友盟重磅发布《2023工业控制系统安全报告》
https://mp.weixin.qq.com/s/MCrmHyNw22ygDhVcYRmMbw
3.国家资通安全研究院官网
https://www.nics.nat.gov.tw/VulnerabilityNewsDetail-21.htm?lang=zh&seq=1512
4.工业网络安全周报-2023年第7期
https://andisec.com/anquanzhoubao20237.html
5.美国网络防御局网络安全和基础设施安全机构,网络安全警报和建议
https://www.cisa.gov/news-events/cybersecurity-advisories?f%5B0%5D=advisory_type%3A94
6.Stuxnet十年后,西门子S7如何仍然是攻击者的天堂
https://www.blackhat.com/eu-23/briefings/schedule/index.html#a-decade-after-stuxnet-how-siemens-s-is-still-an-attackers-heaven-35096
7.SSA-320629:在 RUGGEDCOM CROSSBOW V5.3 中修复的安全漏洞
https://cert-portal.siemens.com/productcert/html/ssa-320629.html
原文始发于微信公众号(山石网科新视界):以远见超越未见|硬核盘点之2023 年工控安全十大漏洞
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论