Industry 4.0: critical IT interfaces

Industry 4.0 work

Share post

Trend Micro research reveals serious weaknesses in critical IT interfaces for Industry 4.0. Protocol gateways represent a security risk for intelligent industrial environments.

Trend Micro today publishes research showing a new type of vulnerability in protocol gateway devices that could expose Industry 4.0 environments to critical attacks.

These devices, also known as protocol converters, enable machines, sensors, actuators and computers within industrial environments to talk to one another and to connected IT systems.

Protocol gateways can be exploited by attackers as the weakest link in the chain

“Protocol gateways rarely receive individual attention, but they are of great importance for Industry 4.0 environments. They can be exploited by attackers as the weakest link in the chain, ”explains Udo Schneider, IoT Security Evangelist Europe at Trend Micro. "By responsibly disclosing nine zero-day vulnerabilities to affected manufacturers and conducting research for the first time in the industry, Trend Micro is leading the way in making OT environments more secure around the world."

Trend Micro Protocol Gateway

The typical position of a protocol gateway is at the lower end of the control network, directly in front of the process network. (Image source: Trend Micro)

Trend Micro Research analyzed five popular protocol gateways used to translate Modbus, one of the most widely used OT protocols in the world. As detailed in the new report, the following weaknesses and weaknesses can be found in the devices:

  • Authentication vulnerabilities that allow unauthorized access
  • Weak encryption implementations that allow configuration databases to be decrypted
  • Weak implementation of authentication mechanisms that lead to the disclosure of sensitive information
  • Enabling denial-of-service attacks
  • Errors in the translation function that can be used to issue clandestine commands to disrupt operations

Attacks that exploit such weaknesses can allow malicious hackers to view and steal production configurations and sabotage critical industrial processes by manipulating process control, camouflaging malicious commands with legitimate packages, and denying access to process control.

Expert recommendations

The report contains several key recommendations for manufacturers, integrators and users of industrial protocol gateways:

  • Before choosing a gateway, carefully examine its design. Make sure that the device has adequate packet filtering capabilities so that it is not prone to translation errors or denial-of-service attacks!
  • Do not rely on a single point of control for the security of the network. Combine ICS firewalls and data traffic monitoring for more security!
  • Configure and protect the gateway carefully - use strong credentials, disable unnecessary services and enable encryption, if supported!
  • Apply the security management to protocol gateways as well as to any other critical OT system! This includes regular checks for vulnerabilities and misconfiguration as well as regular patches.

The full research report is available directly from Trend Micro.

More on this at Trendmicro.com

 


About Trend Micro

As one of the world's leading providers of IT security, Trend Micro helps create a secure world for digital data exchange. With over 30 years of security expertise, global threat research, and constant innovation, Trend Micro offers protection for businesses, government agencies, and consumers. Thanks to our XGen™ security strategy, our solutions benefit from a cross-generational combination of defense techniques optimized for leading-edge environments. Networked threat information enables better and faster protection. Optimized for cloud workloads, endpoints, email, the IIoT and networks, our connected solutions provide centralized visibility across the entire enterprise for faster threat detection and response.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more