SecurityWeek reports that numerous major industrial automation vendors have products affected by two vulnerabilities in PTC's Kepware KEPServerEX product, which could be exploited to compromise operational technology networks.
Threat actors could abuse the flaws, tracked as CVE-2022-2848 and CVE-2022-2825, to facilitate server crashes, data exfiltration, and arbitrary code execution through dedicated OPC UA messages to targeted systems, a Claroty report showed.
Aside from impacting various PTC ThingWorx offerings, the vulnerabilities also affect the GE Digital Industrial Gateway Server, Software Toolbox TOP Server, and Rockwell Automation KEPServer Enterprise products.
"Executing code on a machine running an OPC server puts attackers in a powerful position to further infiltrate the network. There are no special permissions required for simply crashing the server using the exploit. When developing our payload to execute code on the server, we did require at least anonymous permissions to the server in order to execute code. Any server that is exposed to the public internet and not updated could be exploited," said Claroty researcher Uri Katz.
Ransomware has become more dangerous than ever – and that’s why as a society we need to get more proactive about prevention and draw the best people into the fight.
Twenty-five percent of operational technology organizations in the U.S., and other parts of the world have evaded data breaches this year, compared with only 6% in 2022, mostly due to the 17% decline in insider breaches from 2022 to 2023, reports SecurityWeek.
Several U.S. defense and government organizations have been targeted by state-backed Chinese hacking group Bronze Silhouette, also known as Volt Typhoon, for military intelligence over a period of at least two years, according to The Record, a news site by cybersecurity firm Recorded Future.