You are here

Cybersecurity

Trailer Power Line Communications (ICSA-20-219-01)

CISA has published an advisory on an exposure of sensitive information through sent data vulnerability in Trailer Power Line Communications, all of which are affected. Research indicates it is possible to read PLC signals using active antennas reliably at 6 feet and up to 8 feet away, subject to environmental conditions.  No current mitigations have been developed alongside this research. The goal of CISA’s advisory is to bring awareness of the issue. CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability.

Geutebrück G-Cam and G-Code (ICSA-20-219-03) – Product Used in the Energy Sector

CISA has published an advisory on an OS command injection vulnerability in Geutebrück G-Cam and G-Code. For G-Code, EEC-2xxx is affected. For G-Cam, EBC-21xx, EFD-22xx, ETHC-22xx, and EWPC-22xx are affected. Successful exploitation of this vulnerability could allow remote code execution as root. Geutebrück recommends users update to firmware Version 1.12.0.27. CISA also recommends a series of measures to mitigate the vulnerability. Read the advisory at CISA.

Advantech WebAccess HMI Designer (ICSMA-20-219-02) – Product Used in the Water and Wastewater and Energy Sectors

CISA has published an advisory on heap-based buffer overflow, out-of-bounds read, out-of-bounds write, type confusion, stack-based buffer overflow, and double free vulnerabilities in Advantech WebAccess HMI Designer. Versions 2.1.9.31 and prior are affected. Successful exploitation of these vulnerabilities could allow an attacker to read/modify information, execute arbitrary code, and/or crash the application. Advantech has released Version 2.1.9.81 of WebAccess HMI Designer to address the reported vulnerabilities. CISA also recommends a series of measures to mitigate the vulnerabilities.

Cyber Resiliency Resources for Public Safety Partners

The U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) has published Cyber Resiliency Resources for Public Safety, a fact sheet highlighting cyber resiliency resources provided by the federal government, industry, and trade associations. It is intended to assist agencies in determining their current network cybersecurity and resiliency capabilities and identify ways to improve their ability to defend against cyber incidents.

Could your Asset Management Program be Hindering your OT Vulnerability Management Program?

WaterISAC’s 15 Cybersecurity Fundamentals for Water and Wastewater Utilities, #7 – Embrace Vulnerability Management discusses how vulnerability management is at the core of every cyber risk management strategy. It also highlights that only when you know what you have are you able to effectively discover, prioritize, and remediate vulnerabilities to any (IT or OT) system. Therefore, a comprehensive asset inventory is a foundational prerequisite for successful vulnerability management.

Australia is Down Under with Cyber Security Strategy 2020

In carrying the cybersecurity is everyone’s responsibility banner, Australia just outlined its Strategy to invest $1.67 billion over ten years to help secure Australia’s governments, businesses, and community. The Strategy includes protecting and actively defending the country’s critical infrastructure which the report states has been impacted by approximately 35% of cyber incidents during the past year, including water. Similar to efforts by U.S.

CISA ICS Alert: Robot Motion Servers

CISA has published an alert advising it is aware of a public report of a vulnerability affecting robot motion servers. The motion servers are programs written in OEM exclusive programming languages and run on the robot controller. Motion servers enable receiving target values and optionally sending actual values. According to the public report, which was coordinated with CISA prior to its release, researchers identified this vulnerability in the motion servers that allows an adjacent attacker to execute arbitrary code.

Delta Industrial Automation CNCSoft ScreenEditor (ICSA-20-217-01)

CISA has published an advisory on stack-based buffer overflow, out-of-bounds read, and access of uninitialized pointer vulnerabilities in Delta Industrial Automation CNCSoft ScreenEditor. Versions 1.01.23 and prior are affected. Successful exploitation of these vulnerabilities could allow an attacker to read/modify information, execute arbitrary code, and/or crash the application. Delta Electronics recommends updating to the latest version of CNCSoft ScreenEditor Version 1.01.26 and restricting the interaction of the application to trusted files.

Perch Security-WaterISAC Webinar: Collect, Detect, Respond – A SIEM Built for Threat Intelligence

On Thursday, July 30, 2020, WaterISAC joined Perch for a webinar on collecting, detecting, and responding to threat intelligence. WaterISAC Managing Director, Michael Arceneaux offered opening remarks. Perch Security’s CISO, Wes Spencer, and Director of Threat Research, Paul Scott shared thoughts on community-based threat intelligence and threat activty in the Water and Wastewater Sector. And not that we don’t love Perch Security, but the star of the show was unequivocally Barry Blanchard, IT Manager of Onondaga County Water Authority (OCWA).

National Cybersecurity Exercise for Australia’s Water and Wastewater Sector

The Australian Cyber Security Centre (ACSC) is inviting water and wastewater sectors organizations to participate in a national, two-day cybersecurity exercise in August 2021 aimed to strengthen cybersecurity resilience. The ACSC intends for the exercise to provide Australian participants with the opportunity to gain experience responding to a cyber incident scenario and evaluate areas for improvement. The ACSC has also identified the following goals for organizations and personnel to achieve from participating in the exercise:

Pages

Subscribe to Cybersecurity