Exposed infrastructures: Discovery, attacks and remediation of insecure ics remote management devices

T Sasaki, A Fujita, CH Ganán… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
T Sasaki, A Fujita, CH Ganán, M van Eeten, K Yoshioka, T Matsumoto
2022 IEEE Symposium on Security and Privacy (SP), 2022ieeexplore.ieee.org
Geographically distributed infrastructures, such as buildings, dams, and solar power plants,
are commonly maintained via Internet-connected remote management devices. Previous
studies on detecting and securing industrial control systems (ICS) have overlooked these
remote management devices, as they do not expose ICS-specific services like Modbus and
BACnet and thus do not show up in Internet-wide scans for such services. In this paper, we
implement and validate a discovery method for these devices via their Web User Interface …
Geographically distributed infrastructures, such as buildings, dams, and solar power plants, are commonly maintained via Internet-connected remote management devices. Previous studies on detecting and securing industrial control systems (ICS) have overlooked these remote management devices, as they do not expose ICS-specific services like Modbus and BACnet and thus do not show up in Internet-wide scans for such services. In this paper, we implement and validate a discovery method for these devices via their Web User Interface (WebUI) and detect 890 devices in Japan alone. We also show that many of these devices are highly insecure. Many allow access to the status or even the control over industrial systems without proper authentication. Taking a closer look at three prevalent remote management devices, we discovered 13 0-day vulnerabilities, several of which were rated as medium or high severity. They have been responsibly disclosed to the manufacturers. By using honeypots that imitate these systems, we show that over time, only a small number of attackers enter these systems, but some do change critical parameters. Attackers appear to interact more with the system when more facility information is displayed on the WebUI. Finally, we notified operators of 317 vulnerable remote management devices by email and telephone. We reached 212 persons in charge of the devices and received confirmation that our method had correctly identified the device. 50% of the persons in charge of the devices stated that they mitigated or will mitigate the problem. We confirmed their actions via a followup scan for vulnerable devices and found that measures were taken for 58% of the devices when we could reach the persons in charge of the device.
ieeexplore.ieee.org
Showing the best result for this search. See all results