Cybersecurity researchers identified a troubling vulnerability in Schneider Electric Modicon PLCs that could be used to bypass normal authentication safeguards and wreak havoc on one of the most common PLC device brands in IoT.
A cybercriminal who finds one and takes control could launch a ransomware attack, steal sensitive data, shut down HVAC systems, deactivate lights, disable emergency back-up systems and more.
A cursory search on Shodan Search Engine, the Google of internet-connect devices, turned up 92 examples globally and 12 in the U.S. of vulnerable, internet-connected Schneider Electric Modicon PLCs.
And that was just one vulnerable PLC model.
Schneider says a total of six PLC models have the vulnerability, and a patch isn't expected until Q4 2021. In less than 30 minutes, a search on Shodan revealed a vulnerable Schneider Electric PLC connected to the internet at an organization in Pittsburgh that has assets worth millions of dollars. This is just one example.
"Bad actors are looking for low-hanging fruit like this when a security advisory comes out because they know that some companies either aren't aware of the vulnerability or won't move quickly enough to eliminate risks."
Scott Christensen, GrayMatter Cybersecurity Practice Director
Industrial organizations that follow best practices in cybersecurity — such as ensuring no PLCs are connected to the internet — are in a much better position to deal with unpatched threats like this one.
No organization is perfect, and many might not know the level of exposure to this type of risk. That's where third parties like GrayMatter can help by conducting comprehensive cybersecurity assessments of an organization's IoT assets.
Here's a short list of questions to ask yourself and your colleagues to determine if an assessment would help. Hint: the answer to each one should be "No." If the answer to any of these is "Yes" or "I don't know," it's time to seek out a third-party cybersecurity assessment to get answers and build in additional protections.
GrayMatter's comprehensive OT cybersecurity assessment helps you confidently answer these questions, and many others.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |