April 21, 2024

It’s normal for operational know-how (OT) groups to attach industrial management programs (ICS) to distant management and monitoring facilities through wi-fi and mobile options that generally include vendor-run, cloud-based administration interfaces. These connectivity options, additionally known as industrial wi-fi IoT gadgets, improve the assault floor of OT networks and might present distant attackers with a shortcut into beforehand segmented community segments that comprise vital controllers.

Industrial cybersecurity agency Otorio launched a report this week highlighting the assault vectors these gadgets are vulnerable to together with vulnerabilities the corporate’s researchers present in a number of such merchandise. “Industrial wi-fi IoT gadgets and their cloud-based administration platforms are enticing targets to attackers searching for an preliminary foothold in industrial environments,” the Otorio researchers mentioned of their report. “That is as a result of minimal necessities for exploitation and potential influence.”

A shift in conventional OT community structure

OT safety has usually adopted the Purdue Enterprise Reference Architecture (PERA) mannequin to determine the place to position sturdy entry management layers and do segmentation. This mannequin, which dates to the Nineteen Nineties, splits enterprise IT and OT networks into six practical ranges.

Degree 0 is the gear that straight influences bodily processes and consists of issues like valves, motors, actuators, and sensors.

Degree 1 or the Fundamental Management layer consists of subject controllers corresponding to programmable logic controllers (PLCs) and distant terminal models (RTUs) that management these sensors, valves, and actuators based mostly on logic (applications) uploaded to them by engineers.

Degree 2 is the supervisory management layer which incorporates supervisory management and knowledge acquisition (SCADA) programs that accumulate and act upon the information obtained from the Degree 1 controllers.

Degree 3 is the positioning management layer and consists of programs that straight assist a plant’s operations corresponding to database servers, software servers, human-machine interfaces, engineering workstations which are used to program subject controllers and extra. That is usually known as the Management Middle and linked to a corporation’s common IT enterprise community (Degree 4) by way of a demilitarized zone (DMZ).

It’s on this DMZ the place organizations have centered their perimeter safety efforts to have a powerful segmentation between the IT and OT components of their networks. Extra controls are usually put in place between Degree 3 and Degree 2, to guard subject gadgets from intrusions into the management facilities.

Nevertheless, some organizations can have distant industrial installations that they want to connect with their central management facilities. That is extra frequent in industries corresponding to fuel and oil the place operators have a number of oil fields and fuel wells in exploitation at completely different areas, however it’s additionally prevalent in different industries. These hyperlinks between distant Degree 0-2 gadgets and Degree 3 management programs are sometimes offered by industrial mobile gateways or industrial Wi-Fi entry factors.

These industrial wi-fi IoT gadgets can converse to subject gadgets over a number of protocols, corresponding to Modbus and DNP3, after which join again to the group’s management middle by way of the web by utilizing numerous safe communication mechanisms like VPN. Many system producers additionally present cloud-based administration interfaces for industrial asset house owners to handle their gadgets remotely.

Vulnerabilities in industrial wi-fi IoT gadgets

These, like some other gadgets linked to the web, improve the assault floor of OT networks and weaken the safety controls historically put in place by organizations, providing a bypass for attackers into the decrease ranges of OT networks. “Using search engines like google corresponding to Shodan, now we have noticed widespread publicity of business mobile gateways and routers, making them simply discoverable and doubtlessly susceptible to exploitation by risk actors,” the Otorio researchers mentioned of their report. A few of their findings concerning gadgets with internet-reachable net servers and interfaces embrace:




Sierra Wi-fi



Teltonika Networks



InHand Networks


http.html:”Login failed! Examine

your username & password”



http.html:”MOXA OnCell”

ETIC Telecom


http.html:”ETIC TELECOM”

The researchers declare they discovered 24 vulnerabilities within the web-based interfaces of gadgets from three of those distributors — Sierra, InHand, and ETIC — and managed to realize distant code execution on all three.

Whereas many of those flaws are nonetheless within the technique of accountable disclosure, one which has already been patched impacts Sierra Wi-fi AirLink routers and is tracked CVE-2022-46649. This can be a command injection vulnerability within the IP logging function of ACEManager, the web-based administration interface of the router, and is a variation of one other flaw discovered by researchers from Talos in 2018 and tracked as CVE-2018-4061.

It seems that the filtering put in place by Sierra to handle CVE-2018-4061 didn’t cowl all exploit situations and researchers from Otorio have been capable of bypass it. In CVE-2018-4061, attackers might connect extra shell instructions to the tcpdump command executed by the ACEManager iplogging.cgi script by utilizing the -z flag. This flag is supported by the command-line tcpdump utility and is used to move so-called postrotate instructions. Sierra fastened it by imposing a filter that removes any -z flag from the command handed to the iplogging script if it is adopted by an area, tab, kind feed or vertical tab after it, which might block, for instance, “tcpdump -z reboot”.

What they missed in keeping with Otorio is that the -z flag would not require any of these characters after it and a command like “tcpdump -zreboot”, would execute simply effective and bypass the filtering. This bypass alone would nonetheless restrict the attackers to executing binary information that exist already on the system, so the researchers developed a option to conceal their payload in a PCAP (package deal seize) file uploaded to the system through one other ACEManager function known as iplogging_upload.cgi. This particularly crafted PCAP file may also behave as a shell script when parsed by sh (the shell interpreter) and its parsing and execution may be triggered by utilizing the -z vulnerability in iplogging.cgi.

Cloud administration dangers

Even when these gadgets do not expose their web-based administration interfaces on to the web, which isn’t a safe deployment observe, they might not be utterly unreachable to distant attackers. That is as a result of most distributors present cloud-based administration platforms that enable system house owners to carry out configuration adjustments, firmware updates, system reboots, tunnel visitors over the gadgets, and extra.

The gadgets usually talk with these cloud administration providers utilizing machine-to-machine (M2M) protocols, corresponding to MQTT, and their implementation might have weaknesses. The Otorio researchers discovered vital vulnerabilities within the cloud platforms of three distributors, permitting attackers to compromise any cloud-managed gadgets remotely with out authentication.

“By focusing on a single vendor cloud-based administration platform, a distant attacker could expose 1000’s of gadgets positioned on completely different networks and sectors,” the researchers mentioned. “The assault floor over the cloud administration platform is large. It consists of exploitation of the online software (cloud person interface), abusing M2M protocols, weak entry management insurance policies, or abusing a weak registration course of.”

The researchers exemplify these dangers with a series of three vulnerabilities they discovered within the “System Supervisor” cloud platform of InHand Networks and the firmware of its InRouter gadgets that would have resulted in distant code execution with root privileges on all cloud-managed InRouter gadgets.

First, they regarded on the means by which gadgets speak to the platform through MQTT and the best way authentication, or “registration,” is achieved they usually discovered that the registration makes use of insufficiently random values and may be brute-forced. In different phrases, two of the vulnerabilities allowed the researchers to drive a router to offer its configuration file by impersonating an authenticated connection and write duties to the router corresponding to altering its hostname.

The third vulnerability was in the best way the router parsed configuration information through MQTT, notably within the perform used to parse parameters for a function known as auto_ping. The researchers discovered they may allow auto_ping after which concatenate a reverse shell command line to the auto_ping_dst perform and this could execute with root privileges on the system.

Wi-fi assaults on OT networks

Along with the distant assault vectors accessible over the web, these gadgets additionally expose Wi-Fi and mobile alerts domestically so any assaults over these applied sciences might be used in opposition to them. “Various kinds of native assaults can be utilized in opposition to Wi-Fi and mobile communication channels, ranging from assaults on weak encryptions corresponding to WEP and downgrade assaults to the susceptible GPRS, all the best way to advanced chipset vulnerabilities that will take time to patch,” the researchers mentioned.

Whereas the researchers did not examine Wi-Fi or mobile baseband modem vulnerabilities, they carried out reconnaissance utilizing WiGLE, a public wi-fi community mapping service that collects details about wi-fi entry factors worldwide. “Leveraging the superior filtering choices, we wrote a Python script scanning for doubtlessly high-value industrial or vital infrastructure environments, highlighting ones configured with weak encryption,” the researchers mentioned. “Our scanning uncovered 1000’s of wi-fi gadgets associated to industrial and important infrastructure, with tons of configured with publicly recognized weak encryptions.”

Utilizing this method, the researchers managed to seek out gadgets with weak wi-fi encryption deployed in the true world in manufacturing crops, oil fields, electrical substations, and water remedy amenities. Attackers might use such reconnaissance to determine weak gadgets after which journey on web site to take advantage of them.

Mitigating wi-fi IoT system vulnerabilities

Whereas patching vulnerabilities in such gadgets after they’re discovered is critically vital due to their privileged place in OT networks and direct entry to vital controllers, extra preventive steps needs to be taken to mitigate dangers. The Otorio researchers have the next suggestions:

  • Disable and keep away from any insecure encryptions (WEP, WAP) and when potential, don’t enable legacy protocols corresponding to GPRS.
  • Disguise your networks names (SSID).
  • Use MAC-based whitelisting, or use certificates, for linked gadgets.
  • Validate administration providers are restricted to the LAN interface solely or are IP whitelisted.
  • Guarantee no default credentials are in use.
  • Be alert on new safety updates to your gadgets.
  • Confirm these providers are disabled if unused (enabled by default on many circumstances).
  • Implement safety options individually (VPN, firewalls), treating visitors from the IIoT as untrusted.

Copyright © 2023 IDG Communications, Inc.