Research Unveils Cyber Risks in M2M Protocols and Asset Registration
That Expose Hundreds of Thousands of Devices and OT Networks to Attack
TEL AVIV, Israel and SINGAPORE, May 15, 2023 /PRNewswire/ -- OTORIO, the leading provider of operational technology (OT) cyber and digital risk management solutions, today announced that three significant industrial cellular router vendors have vulnerabilities in their cloud management platforms that expose customers' operational networks to external attack. This raises questions about the safety of connecting OT to the cloud and suggests a need for standard industry regulations to eliminate such security risks.
OTORIO Security Researcher Roni Gavrilov shared key findings and remediation tips at Black Hat Asia 2023, taking place May 9-12 at the Marina Bay Sands Singapore.
An industrial cellular router allows multiple devices to connect to the internet from a cellular network. It is commonly used in industrial settings, such as manufacturing plants or oil rigs, where traditional wired internet connections may not be available or reliable. Vendors of these devices employ cloud platforms to provide customers with remote management, scalability, analytics and security. However, OTORIO's research found 11 vulnerabilities in the cloud platforms studied, allowing remote code execution and full control over hundreds of thousands of devices and OT networks - in some cases, even those not actively configured to use the cloud.
"As the deployment of IIoT devices becomes more popular, it's important to be aware that their cloud management platforms may be targeted by threat actors," said Gavrilov. "A single IIoT vendor platform being exploited could act as a "pivot point" for attackers, accessing thousands of environments at once."
OTORIO discovered a wide range of attack vectors based on the security level of the vendor's cloud platform, including several vulnerabilities in M2M (machine-to-machine) protocols and weak asset registration mechanisms. In some cases, these security gaps enable attackers to:
- Gain root access through a reverse-shell
- Compromise devices in the production network, facilitating unauthorized access and control with root privileges
- Compromise devices, exfiltrate sensitive information, and perform operations such as shutdown
Some attacks require identifiers like Media Access Control (MAC) address, serial number or International Mobile Equipment Identity (IMEI) to breach cloud-connected devices, but others do not. One serious issue affecting all three vendors is that their platforms expose devices that have not been configured to use the cloud. Furthermore, breaches of these devices may bypass all the security layers in the Purdue Enterprise Reference Architecture Model for several different vendors.
This announcement follows OTORIO's February discovery of wireless IIoT vulnerabilities that provide a direct path to internal OT networks, enabling hackers to bypass the common protection layers in the environments.
About OTORIO
OTORIO has pioneered an industrial-native OT security platform that enables its customers to achieve an integrated, holistic security strategy for industrial control systems (ICS) and cyber-physical systems (CPS). Together with its partners, OTORIO empowers operational security practitioners to proactively manage cyber risks and ensure resilient operations.
The company's platform provides automated and consolidated visibility of the entire operational network, enabling companies to take control of their security posture, eliminate critical risks, and deliver immediate business value across the organization. OTORIO's global team combines the extensive mission-critical experience of top nation-state cyber security experts with deep operational and industrial domain expertise. To learn more, visit OTORIO.com.
Logo - https://mma.prnewswire.com/media/2004395/4033816/Otorio_Logo.jpg
SOURCE Otorio
WANT YOUR COMPANY'S NEWS FEATURED ON PRNEWSWIRE.COM?
Newsrooms &
Influencers
Digital Media
Outlets
Journalists
Opted In
Share this article