
Importance of Industrial Control System (ICS) Security
In today’s connected society, protecting industrial control systems (ICS) is crucial for businesses and critical infrastructure sectors such as oil and gas, electricity production, and water. ICS is vulnerable to cyber-attacks from both inside and outside the network, and a hacker with knowledge of software, process equipment, and networks can easily gain access to it if not properly protected.
CISA’s Warning on ICS Vulnerabilities
The US Cybersecurity and Infrastructure Security Agency (CISA) recently published recommendations on 49 vulnerabilities in eight ICS systems used in critical infrastructure sectors. The warning identified vulnerabilities in ICS devices from vendors such as Siemens, Hitachi, Rockwell, Delta Electronics, VISAM, and Keysight. Several of the vulnerabilities can be exploited remotely and allow attackers to gain control of compromised systems, alter settings, and steal data.
Siemens’ Scalance-Based Vulnerabilities

Siemens’ Scalance W-700 devices, a high-end networking and bus system package, had 17 vulnerabilities discovered in different third-party dependencies. These vulnerabilities can lead to an attacker elevating privileges, remote code execution, denial-of-service attacks, and revealing critical information. Siemens recommends enterprises upgrade their software to v2.0 or later and set safeguards to secure network access to devices.
Siemens’ Ruggedcom APE1808 Vulnerabilities
The warning contains 23 of the 49 vulnerabilities, including seven exploits in Siemens’ Rugged com APE1808, an industry grade application processing engine (APE) module that has yet to be fixed. Attackers can take advantage of vulnerabilities in the APE module, which is used to host commercial apps, to gain administrative privileges and compromise system functionality

Mitigating ICS Vulnerabilities
To mitigate ICS vulnerabilities, businesses must update to the latest software version as soon as it’s available, limit network exposure for control systems, isolate control system networks and distant devices from corporate networks by locating them behind firewalls, and use secure remote access techniques such as Virtual Private Networks (VPNsJ.I)
Siemens also advises users to establish their environment in accordance with its Industrial Security operating principles.
Conclusion
As cyber-attacks on ICS become more prevalent, it’s crucial for businesses and critical infrastructure sectors to prioritize their security. By implementing recommended mitigations and following industry-standard security practices, businesses can reduce their risk of being compromised and protect their vital operations.
Security Vulnerabilities Web Vulnerabilities Industrial Control System Vendors Finstein