On October 11, 2022, researchers at cybersecurity company Claroty reported a critical vulnerability (CVE-2022-38465) detected in Siemens Simatic programmable logic controller (PLC), which allows hackers to extract the hard-coded, global private cryptographic keys embedded in Siemens Simatic programmable logic controller (PLC) and TIA Portal product lines and also enables to take control of the device. According to researchers, the attackers can use these cryptographic keys to perform multiple advanced attacks against SIMATIC devices and the related TIA Portal, and bypass all four of its access level protections. In addition, even attackers could use this secret information to compromise the entire SIMATIC S7-1200/1500 product line. The vulnerability CVE-2022-38465 is found in Siemens Simatic (PLC) with a CVSS score of 9.3, which has been already addressed by Siemens as a part of security updates issued on October 11, 2022. The vulnerability CVE-2022-38465 impacts SMATIC's Drive Controller family, ET 200SP Open Controller CPU 1515SP (PC2 or PC), S7-1200 CPU family, S7-1500 CPU family, S7-1500 Software Controller and S7-PLCSIM Advanced. Claroty researchers claimed that they were able to gain read and write privileges for the controller by exploiting a previously disclosed flaw (CVE-2020-15782) in Siemens PLCs, which allows them to recover the private key. By performing this, it not only permits an attacker to circumvent access controls and override native code, but also allows them to obtain full control over every PLC per affected Siemens product line. Further, the vulnerability CVE-2022-38565 mirrors another severe shortcoming that was identified in Rockwell Automation PLCs (CVE-2021-22681) last year and which could have enabled an attacker to connect remotely to the controller, and upload malicious code, download information from the PLCs, or install new firmware. As mitigation, Siemens recommends customers to use legacy PG/PC and HMI communications only in trusted network environments and secure access to TIA Portal and CPU to prevent unauthorized connections. Although Siemens has started encrypting the communications between engineering stations, PLCs, and HMI panels with Transport Layer Security (TLS) in TIA Portal version 17, the company is warned that there is an increase in the misuse of the global private key.
African countries are facing a rapidly changing cybersecurity landscape. Although some nations reported fewer cyberattacks in 2023, others saw major increases. Kenya experienced a ...
Security experts discovered several campaigns using the rising interest in the free and open-source AI assistant OpenClaw to deliver malicious applications and steal credentials. T...
A sophisticated multi-stage malware campaign delivering the Vidar Infostealer has been uncovered, leveraging AutoIt scripting, file masquerading, and legitimate online platforms to...