Mission: Find vulnerabilities in my lab's PLC in the easiest and fastest way possible!
Mission: Find vulnerabilities in my lab's PLC in the easiest and fastest way possible!
Let me introduce a very easy use case for managing a old PLC in my room. Since I didn't have any special physical collection equipment at home, I just ran '#Edge' on my laptop (VM-EWS) on the same network as the PLC and the results were quickly delivered to the solution's analysis server in the cloud. That's all I did. Let’s take a look at what I get with this simple action.
Ta-da! I'm glad to see detailed information, starting with the same graphical images of the PLC that would have been hard to see in my dark room through the solution GUI.
[Asset Management]
- First of all, not only the IP and MAC, but also the manufacturer, device type, Purdue level, model, firmware version and rack/slot of my PLC were automatically detected.
[IR Management]
- Okay, now I will add additional information / label such as contact and physical location through the solution GUI for my PLC. The reason is to follow my own SoP/Playbook to respond quickly if incidents occur on my PLC.
[Risk Management]
- Through the solution, I can see security vulnerabilities and found out that the 'Firmware' version of my PLC is 'Outdated'. From a management perspective, a 'Risk Simulator' in the solution allows me to understand how much security can be improved by supplementing relevant risk factors through an automatically reflected/changed 'Risk Score'. That's really useful!
[Vulnerability Management]
- Next, I can find the list of CVEs that perfectly match my PLC model and version. Among these, looking at ICSA-22-041-01 (including CVE-2021-37205, CVE-2021-37204, and CVE-2021-37185), I found that my PLC can be affected through DoS by unauthenticated attackers sending prepared packet over port 102/tcp.
[Patch Management & Mitigation]
- According to the 'Recommendation' of CVEs presented by the solution, my PLC belongs to the SIMATIC S7-1200 CPU family, so I need to prepare 'Update to v21.9.4 or later'. The problem is that updates are not possible right away. As a workaround, I plan to integrate the solution with firewalls to automatically implement enhanced policies for the port (102/tcp) and unmanaged communications.
Let me summarize: "Mission cleared with a latest CPS/OT solution"
- Starting with using this data/information provided by the solution by simply running a 'Edge' on my host, I could eventually make plans for management of 'Asset/Vulnerability/Risk & Incident Response' in relation to the requirements listed in #NIS2.
- I wanted to share my real-experience of OT security in a very simple and easy way by utilizing the latest technology solution.

Comments
Post a Comment