Finding vulnerabilities: Free tool ENIP & CIP Stack Detector

B2B Cyber ​​Security ShortNews

Share post

Team82, the research department of industrial cybersecurity specialist Claroty, is now making its self-developed EtherNet/IP stack detection tool ENIP & CIP Stack Detector available free of charge via its GitHub repository to anyone interested in detecting vulnerabilities.

The tool can be used by cybersecurity researchers, OT engineers and industrial plant operators to identify and classify the ENIP stack code of their deployed commercial and homegrown products. This allows them to better assess their exposure to newly discovered vulnerabilities and then prioritize updates.

Assess vulnerabilities - prioritize updates

Team82 has deployed the EtherNet/IP & CIP Stack Detector at the heart of several ENIP-related projects, such as the November 499 disclosure of a stack overflow vulnerability in Real Time Automation's (RTA) 2020ES ENIP stack. Further disclosures have made this clear that plant operators often have deficits in identifying affected devices as soon as a critical ENIP stack vulnerability has been identified and published: With many products it is not clear which software components they contain, for example the implemented protocol stacks. This can now be checked with the new tool.

Vulnerabilities in devices with ENIP stack

The tool can be used to analyze and eliminate vulnerabilities or to identify honeypots. Plant operators can use the tool to identify devices with an ENIP stack that are affected by a newly discovered security vulnerability. Without a software bill of materials (SBOM), users are often blind to the components used in commercial products and may be unaware that they are impacted by critical vulnerabilities. This complicates patch management decisions and can leave them vulnerable to published vulnerabilities as well. The tool is also suitable for classifying honeypots and optimizing them so that attackers can hardly identify them as such.

More at Claroty.com

 


About Claroty

Claroty, the Industrial Cybersecurity Company, helps its global customers discover, protect and manage their OT, IoT and IIoT assets. The company's comprehensive platform can be seamlessly integrated into customers' existing infrastructure and processes and offers a wide range of industrial cybersecurity controls for transparency, threat detection, risk and vulnerability management and secure remote access - with significantly reduced total cost of ownership.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more