You are here

Cybersecurity

Siemens Automation License Manager (ICSA-20-224-07) – Products Used in the Water and Wastewater and Energy Sectors

CISA has published an advisory on an improper authorization vulnerability in Siemens Automation License Manager. For Automation License Manager 5, all versions are affected. For Automation License Manager 6, all versions prior to v6.0.8 are affected. Successful exploitation of this vulnerability could allow an attacker to locally escalate privileges and modify files that should be protected against writing. For Automation Manager 5, Siemens recommends users disable access to drives which have licenses installed, for non-administrator users.

Microsoft Releases August 2020 Security Updates

Microsoft has released its monthly update to address vulnerabilities in its software. For this month, Microsoft has released security updates for Microsoft Windows, Microsoft Edge (EdgeHTML and Chromium-based), Microsoft ChakraCore, Internet Explorer, Microsoft Scripting Engine, SQL Server, Microsoft JET Database Engine, .NET Framework, ASP.NET Core, Microsoft Office and Microsoft Office Services and Web Apps, Microsoft Windows Codecs Library, and Microsoft Dynamics.

Lessons Learned from the Top Eight World Crises Exploited by Cyber Criminals

The COVID-19 pandemic isn’t the only worldwide crisis to have been exploited by cyber criminals. Seven earlier crises that were similarly leveraged include another disease – the 2009 swine flu – as well as natural disasters like the earthquakes in Haiti in 2010 and Japan in 2011 and malicious events, including the mass shooting targeting New Zealand mosques in 2019. Following a brief review of each of these, and what cyber criminals did to take advantage of the situations, the article presents lessons learned. The first of which is that cyber crime simply has no scruples.

NSA Releases Guidance on Limiting Location Data Exposure

The National Security Agency (NSA) has released an information sheet with guidance on how to configure mobile devices to limit how much location data they can expose. The product emphasizes that location data can be extremely valuable, potentially revealing details like the number of users in a location, user and supply movements, daily routines, and otherwise unknown associations between users and locations. It acknowledges that some of the measures for mitigating location tracking risks are impractical, given that users rely on features that would be disabled by the measures.

Trailer Power Line Communications (ICSA-20-219-01)

CISA has published an advisory on an exposure of sensitive information through sent data vulnerability in Trailer Power Line Communications, all of which are affected. Research indicates it is possible to read PLC signals using active antennas reliably at 6 feet and up to 8 feet away, subject to environmental conditions.  No current mitigations have been developed alongside this research. The goal of CISA’s advisory is to bring awareness of the issue. CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability.

Geutebrück G-Cam and G-Code (ICSA-20-219-03) – Product Used in the Energy Sector

CISA has published an advisory on an OS command injection vulnerability in Geutebrück G-Cam and G-Code. For G-Code, EEC-2xxx is affected. For G-Cam, EBC-21xx, EFD-22xx, ETHC-22xx, and EWPC-22xx are affected. Successful exploitation of this vulnerability could allow remote code execution as root. Geutebrück recommends users update to firmware Version 1.12.0.27. CISA also recommends a series of measures to mitigate the vulnerability. Read the advisory at CISA.

Advantech WebAccess HMI Designer (ICSMA-20-219-02) – Product Used in the Water and Wastewater and Energy Sectors

CISA has published an advisory on heap-based buffer overflow, out-of-bounds read, out-of-bounds write, type confusion, stack-based buffer overflow, and double free vulnerabilities in Advantech WebAccess HMI Designer. Versions 2.1.9.31 and prior are affected. Successful exploitation of these vulnerabilities could allow an attacker to read/modify information, execute arbitrary code, and/or crash the application. Advantech has released Version 2.1.9.81 of WebAccess HMI Designer to address the reported vulnerabilities. CISA also recommends a series of measures to mitigate the vulnerabilities.

Cyber Resiliency Resources for Public Safety Partners

The U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) has published Cyber Resiliency Resources for Public Safety, a fact sheet highlighting cyber resiliency resources provided by the federal government, industry, and trade associations. It is intended to assist agencies in determining their current network cybersecurity and resiliency capabilities and identify ways to improve their ability to defend against cyber incidents.

Could your Asset Management Program be Hindering your OT Vulnerability Management Program?

WaterISAC’s 15 Cybersecurity Fundamentals for Water and Wastewater Utilities, #7 – Embrace Vulnerability Management discusses how vulnerability management is at the core of every cyber risk management strategy. It also highlights that only when you know what you have are you able to effectively discover, prioritize, and remediate vulnerabilities to any (IT or OT) system. Therefore, a comprehensive asset inventory is a foundational prerequisite for successful vulnerability management.

Australia is Down Under with Cyber Security Strategy 2020

In carrying the cybersecurity is everyone’s responsibility banner, Australia just outlined its Strategy to invest $1.67 billion over ten years to help secure Australia’s governments, businesses, and community. The Strategy includes protecting and actively defending the country’s critical infrastructure which the report states has been impacted by approximately 35% of cyber incidents during the past year, including water. Similar to efforts by U.S.

Pages

Subscribe to Cybersecurity