Incident: Security Vulnerabilities in SCADA Systems Impact Critical Infrastructure

Published Date: 2011-03-22

Postmortem Analysis
Timeline 1. The software failure incident happened in March 2011. [4620]
System 1. Siemens Tecnomatix FactoryLink 2. Iconics Genesis32 and Genesis64 3. DATAC RealWin 4. 7-Technologies IGSS [4620]
Responsible Organization 1. Security researcher Luigi Auriemma [4620]
Impacted Organization 1. Oil-, gas- and water-management facilities, factories, and critical infrastructures were impacted by the software failure incident involving vulnerabilities in SCADA systems made by Siemens, Iconics, 7-Technologies, and DATAC [4620].
Software Causes 1. The software causes of the failure incident were multiple vulnerabilities found in SCADA systems made by Siemens, Iconics, 7-Technologies, and DATAC, which allowed attackers to crash systems, siphon sensitive data, gain foothold on systems, find additional security holes, and potentially impact operations [4620].
Non-software Causes 1. The vulnerabilities in SCADA systems were exploited by attack codes released by a security researcher [4620]. 2. The vulnerabilities targeted operator viewing platforms in SCADA systems used in critical infrastructures [4620]. 3. The vulnerabilities could allow an attacker to gain a foothold on a system to find additional security holes that could affect core processes [4620]. 4. The vulnerabilities affected systems made by Siemens, Iconics, 7-Technologies, and DATAC [4620]. 5. The vulnerabilities included buffer-overflow vulnerabilities in the Siemens system and vulnerabilities in Iconics, 7-Technologies IGSS, and DATAC RealWin systems [4620].
Impacts 1. The software failure incident exposed vulnerabilities in SCADA systems used in critical infrastructure such as oil, gas, water management facilities, and factories [4620]. 2. The vulnerabilities allowed attackers to potentially crash systems, siphon sensitive data, gain foothold on systems, and find additional security holes that could affect core processes [4620]. 3. Specific impacts included buffer-overflow vulnerabilities in the Siemens system, remote execution of malicious code on the 7-Technologies IGSS system, and the ability to mask data seen by operators on the DATAC system [4620].
Preventions 1. Regular security assessments and penetration testing of SCADA systems to identify and patch vulnerabilities before they are exploited [4620]. 2. Implementing proper access controls and network segmentation to limit the exposure of SCADA systems to potential attackers [4620]. 3. Keeping software systems up to date with the latest patches and updates to address known vulnerabilities [4620]. 4. Educating employees and operators on cybersecurity best practices to prevent social engineering attacks that could compromise SCADA systems [4620].
Fixes 1. Patching the vulnerabilities in the affected SCADA systems, such as Siemens Tecnomatix FactoryLink, Iconics, Genesis32 and Genesis64, DATAC RealWin, and 7-Technologies IGSS [4620].
References 1. Security researcher Luigi Auriemma who discovered the vulnerabilities and attack codes [4620] 2. U.S. ICS-CERT (Industrial Control Systems–Computer Emergency Response Team) which published advisories for the vulnerabilities [4620] 3. Joel Langill, a control-systems security specialist who provided insights on the affected systems and vulnerabilities [4620]

Software Taxonomy of Faults

Category Option Rationale
Recurring multiple_organization (a) The software failure incident related to vulnerabilities in SCADA systems affecting critical infrastructure has happened again at multiple organizations. The vulnerabilities targeted systems made by Siemens, Iconics, 7-Technologies, and DATAC [4620]. These systems are used in oil, gas, water management facilities, factories, and automated factories [4620]. The exploit codes released targeted specific vulnerabilities in these systems, potentially allowing attackers to crash systems, siphon sensitive data, gain foothold access, and find additional security holes that could impact core processes [4620]. The incident highlights the ongoing security challenges faced by organizations using SCADA systems in critical infrastructures.
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase can be seen in the vulnerabilities found in SCADA systems made by Siemens, Iconics, 7-Technologies, and DATAC. The attack codes released targeted specific vulnerabilities in these systems, such as buffer-overflow vulnerabilities in the Siemens system and vulnerable processes in the Iconics and 7-Technologies systems. These vulnerabilities were identified by a security researcher who published the exploits to draw attention to security problems with SCADA systems [4620]. (b) The software failure incident related to the operation phase is highlighted by the potential impact of the vulnerabilities on critical infrastructure systems. While the vulnerabilities may not directly affect the backend systems that control critical processes, they could allow attackers to gain a foothold on a system and potentially find additional security holes that could impact core processes. The attack codes released could allow attackers to crash systems, siphon sensitive data, or even execute malicious code on the systems, affecting what operators see on their monitors [4620].
Boundary (Internal/External) within_system (a) The software failure incident described in the articles is primarily within_system. The vulnerabilities and attack codes were discovered within the SCADA systems themselves, such as Siemens, Iconics, 7-Technologies, and DATAC. The vulnerabilities allowed attackers to crash systems, siphon sensitive data, gain footholds, and potentially execute malicious code within the systems [4620]. The attacks targeted specific vulnerabilities within the SCADA systems, indicating that the failure originated from within the software systems themselves.
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in this case is primarily due to non-human actions, specifically vulnerabilities in SCADA systems made by various companies like Siemens, Iconics, 7-Technologies, and DATAC. These vulnerabilities were exploited by attack codes released by a security researcher, allowing attackers to crash systems, siphon sensitive data, and potentially gain a foothold to find additional security holes [4620]. The vulnerabilities were not highly dangerous on their own but could still impact critical processes [4620]. (b) Human actions also played a role in this software failure incident as the attack codes exploiting the vulnerabilities were released by a security researcher named Luigi Auriemma. Auriemma published the vulnerabilities and attack codes to draw attention to security problems with SCADA systems, which caught the attention of U.S. ICS-CERT [4620]. Additionally, the vulnerabilities in the systems were identified through tests conducted by Auriemma, showcasing how human actions can contribute to software failures [4620].
Dimension (Hardware/Software) software (a) The software failure incident reported in the articles is primarily related to vulnerabilities found in SCADA systems used in critical infrastructure facilities such as oil, gas, water management, and factories. These vulnerabilities were identified in systems made by companies like Siemens, Iconics, 7-Technologies, and DATAC [4620]. (b) The software failure incident is specifically related to software vulnerabilities in SCADA systems, such as buffer-overflow vulnerabilities in the Siemens system, vulnerabilities in Iconics, 7-Technologies IGSS, and DATAC RealWin systems. These vulnerabilities could allow attackers to crash systems, siphon sensitive data, remote-copy files, execute remote code, and manipulate data displayed on operator screens [4620].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident described in the articles is malicious in nature. The incident involved a researcher releasing attack code that exploited vulnerabilities in SCADA systems used in critical infrastructure facilities such as oil, gas, water management, and factories [4620]. The vulnerabilities targeted by the attack code could allow an attacker to crash systems, siphon sensitive data, gain unauthorized access, and potentially impact core processes [4620]. The researcher published the vulnerabilities and attack codes to draw attention to security issues with SCADA systems, highlighting the malicious intent behind the incident [4620]. Additionally, the attack codes released targeted specific vulnerabilities in systems like Siemens Tecnomatix FactoryLink, Iconics, Genesis32, Genesis64, DATAC RealWin, and 7-Technologies IGSS, indicating a deliberate effort to exploit weaknesses in these systems [4620].
Intent (Poor/Accidental Decisions) accidental_decisions The intent of the software failure incident described in the articles is related to accidental decisions. The incident involved a security researcher, Luigi Auriemma, who discovered vulnerabilities in SCADA systems used in critical infrastructure facilities. Auriemma published exploit codes to draw attention to security issues with SCADA systems, not with the intention of causing harm but to highlight the vulnerabilities for improvement and patching [4620].
Capability (Incompetence/Accidental) accidental (a) The software failure incident reported in the articles is not related to development incompetence. The incident was caused by a security researcher, Luigi Auriemma, who discovered vulnerabilities in SCADA systems used in critical infrastructure facilities and released attack codes to draw attention to security problems with these systems [4620]. (b) The software failure incident can be categorized as accidental. The vulnerabilities in the SCADA systems were accidentally discovered by Luigi Auriemma during a series of tests, and he published the vulnerabilities and attack codes to highlight the security issues with these systems [4620].
Duration temporary The software failure incident described in the articles is more aligned with a temporary failure rather than a permanent one. The incident involves the discovery and exploitation of vulnerabilities in SCADA systems used in critical infrastructure facilities such as oil, gas, water management, and factories. The vulnerabilities were identified by a security researcher who released attack codes targeting specific systems made by Siemens, Iconics, 7-Technologies, and DATAC [4620]. The vulnerabilities discovered in the SCADA systems were not deemed highly dangerous on their own, as they mainly allowed attackers to crash systems or siphon sensitive data. The vulnerabilities were targeted at operator viewing platforms rather than the backend systems directly controlling critical processes. However, experts cautioned that these vulnerabilities could potentially allow attackers to gain a foothold in the system to discover additional security holes that could impact core processes [4620]. The incident highlights a temporary failure scenario where specific circumstances, in this case, the presence of vulnerabilities in the SCADA systems, led to a potential security breach. The vulnerabilities were identified and exploited, indicating a temporary failure that could be addressed through patching and security measures to prevent further exploitation.
Behaviour crash, omission, value, other (a) crash: The vulnerabilities in the SCADA systems could allow an attacker to crash a system. For example, one of the attacks against the Siemens system would result in a denial-of-service [4620]. (b) omission: The vulnerabilities in the SCADA systems could potentially allow an attacker to mask what an operator sees on their monitor, by changing data that appears on the screen, thus omitting to show the correct information to the operator [4620]. (c) timing: There is no specific mention of a timing-related failure in the articles. (d) value: The vulnerabilities in the SCADA systems could allow an attacker to siphon sensitive data or to remote-copy files into the file systems, potentially leading to incorrect data handling [4620]. (e) byzantine: The vulnerabilities in the SCADA systems could allow an attacker to gain a foothold on a system to find additional security holes that could affect core processes, showing inconsistent responses and interactions [4620]. (f) other: The software failure incident described in the articles involves vulnerabilities in SCADA systems that could potentially allow an attacker to execute malicious code on the system, drop files onto the host, and modify operator graphics to deceive the operator, which could be considered as other types of behavior not explicitly covered by the options (a) to (e) [4620].

IoT System Layer

Layer Option Rationale
Perception processing_unit, network_communication, embedded_software (a) sensor: The software failure incident mentioned in the articles does not specifically point to a failure related to sensors. (b) actuator: The incident does not directly mention a failure related to actuators. (c) processing_unit: The vulnerabilities and attack codes released by the security researcher targeted various SCADA systems, including Siemens, Iconics, DATAC, and 7-Technologies. These vulnerabilities could potentially allow attackers to crash systems, siphon sensitive data, or gain unauthorized access to the systems, indicating a failure related to the processing unit of the cyber-physical systems [4620]. (d) network_communication: The vulnerabilities in the SCADA systems could potentially allow attackers to gain a foothold on the system to find additional security holes that could affect core processes. While the articles do not explicitly mention network communication errors, the ability of attackers to exploit vulnerabilities in the systems could involve network communication failures [4620]. (e) embedded_software: The vulnerabilities discovered in SCADA systems, such as Siemens Tecnomatix FactoryLink, Iconics, Genesis32 and Genesis64, DATAC RealWin, and 7-Technologies IGSS, indicate potential flaws in the embedded software of these systems. Attack codes targeting these vulnerabilities could lead to unauthorized access, data manipulation, and potential system compromise, highlighting issues with the embedded software [4620].
Communication unknown The software failure incident described in the articles does not directly relate to a failure at the communication layer of the cyber-physical system. Instead, the incident involves vulnerabilities in SCADA systems used in critical infrastructure, such as oil, gas, water management facilities, and factories. The vulnerabilities identified by the researcher target operator viewing platforms and could potentially allow attackers to crash systems, siphon sensitive data, or gain a foothold to find additional security holes that could affect core processes. The vulnerabilities are not primarily focused on the communication layer but rather on exploiting weaknesses in the SCADA systems themselves [4620].
Application TRUE The software failure incident described in the articles is related to vulnerabilities in SCADA systems used in critical infrastructures such as oil, gas, water management facilities, and factories. The vulnerabilities identified by the researcher Luigi Auriemma target various SCADA systems including Siemens, Iconics, 7-Technologies, and DATAC. These vulnerabilities could allow attackers to crash systems, siphon sensitive data, gain unauthorized access, and potentially execute malicious code on the systems. However, the specific information regarding whether the failure was related to the application layer of the cyber physical system is not explicitly mentioned in the provided articles. Therefore, it is unknown if the failure was specifically related to the application layer as defined.

Other Details

Category Option Rationale
Consequence no_consequence, theoretical_consequence (a) unknown (b) unknown (c) unknown (d) The software failure incident described in the articles did not directly result in any loss of life, physical harm, impact on access to food or shelter, or direct property damage. The vulnerabilities in SCADA systems could potentially allow attackers to crash systems, siphon sensitive data, gain unauthorized access, or manipulate what operators see on their screens, but there is no specific mention of any actual harm or damage caused by these exploits [4620]. (e) unknown (f) unknown (g) The articles do not mention any specific real observed consequences of the software failure incident. It is noted that the likelihood of these vulnerabilities being attacked remotely is low, as such systems are generally not connected to the internet [4620]. (h) The articles discuss potential consequences of the software failure incident, such as allowing attackers to gain a foothold on a system to find additional security holes that could affect core processes, allowing an attacker to remote-copy files into file systems, and potentially executing malicious code on the systems. These are theoretical consequences that could occur if the vulnerabilities were exploited [4620]. (i) unknown
Domain manufacturing, utilities (a) The software failure incident mentioned in the articles is related to the manufacturing industry. The vulnerabilities and attack codes targeted SCADA systems used in automated factories and critical infrastructures [4620]. The affected systems include those used in oil and gas industry, municipal wastewater management facilities, and automated factories [4620]. (g) Additionally, the incident is related to the utilities industry as the SCADA systems targeted in the attack are used in managing water, gas, and oil facilities [4620]. (m) The incident is not related to any other industry mentioned in the options provided.

Sources

Back to List