Friday, February 21, 2025
HomeCVE/vulnerabilityThree New ICS Advisories Released by CISA Detailing Vulnerabilities & Mitigations

Three New ICS Advisories Released by CISA Detailing Vulnerabilities & Mitigations

Published on

SIEM as a Service

Follow Us on Google News

The Cybersecurity and Infrastructure Security Agency (CISA) announced three new Industrial Control Systems (ICS) advisories.

These advisories provide critical insights into vulnerabilities impacting Traffic Alert and Collision Avoidance Systems (TCAS) II, Siemens SIMATIC S7-1200 CPUs, and ZF Roll Stability Support Plus (RSSPlus).

Each advisory includes detailed technical descriptions of the vulnerabilities, associated CVEs, and recommended mitigation measures to safeguard affected systems.

1. Traffic Alert and Collision Avoidance System (TCAS) II: Serious Safety Risks Identified

The TCAS II, widely used in aviation for collision avoidance, has been found to have two significant vulnerabilities: reliance on untrusted inputs in security decisions (CVE-2024-9310) and external control of system settings (CVE-2024-11166).

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

These flaws are exploitable from adjacent networks and could compromise the safety of air traffic management systems.CVE-2024-9310 involves the use of spoofed radio frequency (RF) signals to create fake aircraft on displays.

This could lead to incorrect Resolution Advisories (RAs), which are critical for avoiding mid-air collisions.

The vulnerability has a CVSS v4 score of 6.0.CVE-2024-11166 allows attackers to impersonate a ground station and alter the Sensitivity Level Control (SLC), disabling RAs and causing a denial-of-service (DoS) condition. This vulnerability is more severe, with a CVSS v4 score of 7.1.

Exploiting these vulnerabilities could enable attackers to manipulate safety systems, potentially endangering aircraft operations. Such compromises can lead to the disabling of key functions, jeopardizing both safety and reliability.

2. Siemens SIMATIC S7-1200 CPUs: Cross-Site Request Forgery Vulnerability

Siemens’ SIMATIC S7-1200 CPUs, used in industrial automation, are vulnerable to Cross-Site Request Forgery (CSRF) attacks (CVE-2024-47100).

Exploited remotely with low attack complexity, this vulnerability allows unauthenticated attackers to manipulate a CPU’s operational mode by deceiving a legitimate and authenticated user into clicking on a malicious link. With a CVSS v4 score of 7.2, this flaw is rated as high severity.

Successful exploitation targets the web interface of these devices, impacting the integrity and availability of industrial automation systems. This could disrupt critical operations in industrial environments.

3.ZF Roll Stability Support Plus (RSSPlus): Authentication Bypass Vulnerability

The ZF RSSPlus, an advanced stability system designed for heavy vehicles, is exposed to an Authentication Bypass by Primary Weakness (CVE-2024-12054).

This vulnerability enables an attacker to call diagnostic functions remotely using deterministic SecurityAccess service seeds. The flaw has a CVSS v4 score of 5.9, making it moderate in severity but still concerning.

Exploitation could allow adversaries to affect diagnostic functions, degrade performance, or erase essential software. While the vehicle remains in a safe state, disruptions to system reliability and operational continuity are possible, particularly in high-risk environments.

Operators are advised to update RSSPlus firmware as per vendor guidelines.

CISA also recommends employing robust physical and network security measures to restrict access to telematics and RF equipment. Regular diagnostics and secure firmware provisioning are key preventive measures.

The vulnerabilities uncovered in these three ICS products underscore the growing cybersecurity risks in critical infrastructure sectors.

Exploitation of these flaws could disrupt safety-critical systems in aviation, industrial automation, and automotive stability. To counter such threats effectively, stakeholders should take the following steps:

  1. Patch Management: Apply available updates and patches immediately to close identified security gaps.
  2. Network Segmentation: Isolate vulnerable systems from internet-accessible networks to limit exposure.
  3. Access Control: Limit access to mission-critical systems to authorized personnel only.
  4. Continuous Monitoring: Implement robust intrusion detection systems to identify and respond to potential attacks in real-time.
  5. Incident Response Planning: Prepare contingency plans to minimize downtime and operational impact in case of an attack.

CISA’s advisories offer actionable recommendations, but effective implementation of these measures depends on proactive cooperation between vendors, operators, and security teams.

By addressing these vulnerabilities promptly, organizations can enhance the resilience of critical systems.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...