Exploiting Control Device Vulnerabilities: Attacking Cyber-Physical Water System

P. Sindhwad, Faruk Kazi
{"title":"Exploiting Control Device Vulnerabilities: Attacking Cyber-Physical Water System","authors":"P. Sindhwad, Faruk Kazi","doi":"10.23919/FRUCT56874.2022.9953826","DOIUrl":null,"url":null,"abstract":"Industrial Control Systems (ICS) are transitioning from isolated, custom-built systems to those combining general-purpose computer hosts, wireless networks, and artificial intelligence. An increasing number of vulnerabilities in ICS devices are a major concern since it provides potential adversaries with a simple approach to exploit and attack unpatched ICS systems. This paper investigates attack paths that target unpatched system vulnerabilities and their impact on the ICS, as demonstrated using the Waste Water Treatment Plant (WWTP) testbed. Denial of Service (DoS), Buffer overflow, privilege escalation, and illegal command injection attacks are executed, and their impacts are investigated using CIA and STRIDE threat modeling. The main outcomes of the study are, 1) An update on public advisory CVE-2021-33834 by Moxa. 2) Demonstration of attack on a device with publicly accessible Proof of Concept (POC) of another device using Modbus buffer overflow vulnerability. Finally, various recommendations are provided that can be used for security penetration testing to identify security flaws, as well as directions for product developers to implement security by design.","PeriodicalId":274664,"journal":{"name":"2022 32nd Conference of Open Innovations Association (FRUCT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 32nd Conference of Open Innovations Association (FRUCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/FRUCT56874.2022.9953826","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Industrial Control Systems (ICS) are transitioning from isolated, custom-built systems to those combining general-purpose computer hosts, wireless networks, and artificial intelligence. An increasing number of vulnerabilities in ICS devices are a major concern since it provides potential adversaries with a simple approach to exploit and attack unpatched ICS systems. This paper investigates attack paths that target unpatched system vulnerabilities and their impact on the ICS, as demonstrated using the Waste Water Treatment Plant (WWTP) testbed. Denial of Service (DoS), Buffer overflow, privilege escalation, and illegal command injection attacks are executed, and their impacts are investigated using CIA and STRIDE threat modeling. The main outcomes of the study are, 1) An update on public advisory CVE-2021-33834 by Moxa. 2) Demonstration of attack on a device with publicly accessible Proof of Concept (POC) of another device using Modbus buffer overflow vulnerability. Finally, various recommendations are provided that can be used for security penetration testing to identify security flaws, as well as directions for product developers to implement security by design.
利用控制设备漏洞:攻击网络物理水系统
工业控制系统(ICS)正在从孤立的、定制的系统过渡到结合通用计算机主机、无线网络和人工智能的系统。ICS设备中越来越多的漏洞是一个主要问题,因为它为潜在的攻击者提供了一种利用和攻击未打补丁的ICS系统的简单方法。本文研究了针对未修补系统漏洞的攻击路径及其对ICS的影响,并使用废水处理厂(WWTP)试验台进行了演示。执行拒绝服务(DoS)、缓冲区溢出、特权升级和非法命令注入攻击,并使用CIA和STRIDE威胁建模调查其影响。该研究的主要成果是:1)Moxa对公共咨询CVE-2021-33834进行了更新。2)演示了使用Modbus缓冲区溢出漏洞对具有公开可访问的概念验证(POC)的设备进行攻击。最后,提供了可用于安全渗透测试以识别安全缺陷的各种建议,以及产品开发人员通过设计实现安全性的方向。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信