Article Details

Scrape Timestamp (UTC): 2024-06-28 08:00:25.135

Source: https://thehackernews.com/2024/06/researchers-warn-of-flaws-in-widely.html

Original Article Text

Click to Toggle View

Researchers Warn of Flaws in Widely Used Industrial Gas Analysis Equipment. Multiple security flaws have been disclosed in Emerson Rosemount gas chromatographs that could be exploited by malicious actors to obtain sensitive information, induce a denial-of-service (DoS) condition, and even execute arbitrary commands. The flaws impact GC370XA, GC700XA, and GC1500XA and reside in versions 4.1.5 and prior. According to operational technology (OT) security firm Claroty, the vulnerabilities include two command injection flaws and two separate authentication and authorization vulnerabilities that could be weaponized by unauthenticated attackers to perform a wide range of malicious actions ranging from authentication bypass to command injection. "Successful exploitation of these vulnerabilities could allow an unauthenticated attacker with network access to run arbitrary commands, access sensitive information, cause a denial-of-service condition, and bypass authentication to acquire admin capabilities," the U.S. Cybersecurity and Infrastructure Security Agency (CISA) said in an advisory released in January. The chromatograph, which is used for carrying out critical gas measurements, can be configured and managed by means of a software called MON. The software can also be used to store critical data and generate reports such as chromatograms, alarm history, event logs, and maintenance logs. Claroty's analysis of the firmware and the proprietary protocol used for communications between the device and the Windows client named MON2020 has revealed the following shortcomings - Following responsible disclosure, Emerson has released [PDF] an updated version of the firmware that addresses the vulnerabilities. The company is also recommending end users to follow cybersecurity best practices and ensure that the affected products are not directly exposed to the internet. The disclosure comes as Nozomi Networks detailed several flaws in AiLux RTU62351B that could be abused to access sensitive resources on the device, alter its configuration, and even achieve execution of arbitrary commands as root. The vulnerabilities have been collectively dubbed I11USION. Flaws have also been identified in Proges Plus temperature monitoring devices and their associated software, namely Sensor Net Connect and Thermoscan IP, that could permit admin privileges over critical medical systems, thereby making it possible for a malicious actor to manipulate system settings, install malware, and exfiltrate data. These vulnerabilities, which remain unpatched, could also result in a DoS condition of medical monitoring infrastructure, leading to spoilage of temperature-sensitive medicines and vaccines. Continuous Attack Surface Discovery & Penetration Testing Continuously discover, prioritize, & mitigate exposures with evidence-backed ASM, Pentesting, and Red Teaming.

Daily Brief Summary

MISCELLANEOUS // Major Security Flaws Uncovered in Emerson Rosemount Gas Chromatographs

Researchers from the operational technology (OT) security firm Claroty have discovered multiple vulnerabilities in Emerson Rosemount gas chromatographs, specifically affecting models GC370XA, GC700XA, and GC1500XA (versions 4.1.5 and earlier).

The vulnerabilities include two command injection flaws and two authentication and authorization issues, which could be exploited by unauthenticated attackers.

These security gaps could potentially allow attackers to bypass authentication, execute arbitrary commands, access sensitive information, and induce a denial-of-service (DoS) state.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning that exploitation of these flaws could lead to unauthorized access and control over the gas chromatograph systems.

Emerson has released an updated version of the firmware to patch these security vulnerabilities and is advising users to adhere to cybersecurity best practices and ensure these devices are not directly accessible via the internet.

Another report from Nozomi Networks unveiled similar vulnerabilities in AiLux RTU62351B, Proges Plus temperature monitoring devices, and related software, highlighting the pervasive risks in connected industrial devices.

These other flaws remain unpatched and pose a significant risk, including the potential manipulation of medical monitoring systems and spoilage of temperature-sensitive pharmaceuticals due to DoS attacks.