Cyber Security News

Three New ICS Advisories Released by CISA Detailing Vulnerabilities & Mitigations

The Cybersecurity and Infrastructure Security Agency (CISA) announced three new Industrial Control Systems (ICS) advisories.

These advisories provide critical insights into vulnerabilities impacting Traffic Alert and Collision Avoidance Systems (TCAS) II, Siemens SIMATIC S7-1200 CPUs, and ZF Roll Stability Support Plus (RSSPlus).

Each advisory includes detailed technical descriptions of the vulnerabilities, associated CVEs, and recommended mitigation measures to safeguard affected systems.

1. Traffic Alert and Collision Avoidance System (TCAS) II: Serious Safety Risks Identified

The TCAS II, widely used in aviation for collision avoidance, has been found to have two significant vulnerabilities: reliance on untrusted inputs in security decisions (CVE-2024-9310) and external control of system settings (CVE-2024-11166).

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

These flaws are exploitable from adjacent networks and could compromise the safety of air traffic management systems.CVE-2024-9310 involves the use of spoofed radio frequency (RF) signals to create fake aircraft on displays.

This could lead to incorrect Resolution Advisories (RAs), which are critical for avoiding mid-air collisions.

The vulnerability has a CVSS v4 score of 6.0.CVE-2024-11166 allows attackers to impersonate a ground station and alter the Sensitivity Level Control (SLC), disabling RAs and causing a denial-of-service (DoS) condition. This vulnerability is more severe, with a CVSS v4 score of 7.1.

Exploiting these vulnerabilities could enable attackers to manipulate safety systems, potentially endangering aircraft operations. Such compromises can lead to the disabling of key functions, jeopardizing both safety and reliability.

2. Siemens SIMATIC S7-1200 CPUs: Cross-Site Request Forgery Vulnerability

Siemens’ SIMATIC S7-1200 CPUs, used in industrial automation, are vulnerable to Cross-Site Request Forgery (CSRF) attacks (CVE-2024-47100).

Exploited remotely with low attack complexity, this vulnerability allows unauthenticated attackers to manipulate a CPU’s operational mode by deceiving a legitimate and authenticated user into clicking on a malicious link. With a CVSS v4 score of 7.2, this flaw is rated as high severity.

Successful exploitation targets the web interface of these devices, impacting the integrity and availability of industrial automation systems. This could disrupt critical operations in industrial environments.

3.ZF Roll Stability Support Plus (RSSPlus): Authentication Bypass Vulnerability

The ZF RSSPlus, an advanced stability system designed for heavy vehicles, is exposed to an Authentication Bypass by Primary Weakness (CVE-2024-12054).

This vulnerability enables an attacker to call diagnostic functions remotely using deterministic SecurityAccess service seeds. The flaw has a CVSS v4 score of 5.9, making it moderate in severity but still concerning.

Exploitation could allow adversaries to affect diagnostic functions, degrade performance, or erase essential software. While the vehicle remains in a safe state, disruptions to system reliability and operational continuity are possible, particularly in high-risk environments.

Operators are advised to update RSSPlus firmware as per vendor guidelines.

CISA also recommends employing robust physical and network security measures to restrict access to telematics and RF equipment. Regular diagnostics and secure firmware provisioning are key preventive measures.

The vulnerabilities uncovered in these three ICS products underscore the growing cybersecurity risks in critical infrastructure sectors.

Exploitation of these flaws could disrupt safety-critical systems in aviation, industrial automation, and automotive stability. To counter such threats effectively, stakeholders should take the following steps:

  1. Patch Management: Apply available updates and patches immediately to close identified security gaps.
  2. Network Segmentation: Isolate vulnerable systems from internet-accessible networks to limit exposure.
  3. Access Control: Limit access to mission-critical systems to authorized personnel only.
  4. Continuous Monitoring: Implement robust intrusion detection systems to identify and respond to potential attacks in real-time.
  5. Incident Response Planning: Prepare contingency plans to minimize downtime and operational impact in case of an attack.

CISA’s advisories offer actionable recommendations, but effective implementation of these measures depends on proactive cooperation between vendors, operators, and security teams.

By addressing these vulnerabilities promptly, organizations can enhance the resilience of critical systems.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Record Breaking 5.6 Tbps DDoS attack Launched by Mirai Botnet

 The Mirai botnet unleashed a record-breaking Distributed Denial of Service (DDoS) attack on October 29,…

9 minutes ago

Criminal IP and OnTheHub Partner to Deliver Advanced Cybersecurity Solutions for Education

AI SPERA, a leading Cyber Threat Intelligence (CTI) provider, has collaborated with OnTheHub, a global…

46 minutes ago

SQL Injection Vulnerability in Microsoft’s DevBlogs Lets Hackers Injecting Malicious SQL

In a recent discovery, a security researcher uncovered a critical SQL injection vulnerability on Microsoft’s…

1 hour ago

Security Researchers Discover Critical RCE Vulnerability, Earned $40,000 Bounty

Cybersecurity researchers Abdullah Nawaf and Orwa Atyat, successfully escalated a limited path traversal vulnerability into…

3 hours ago

IBM i Access Client Solutions Might Be Leaking Your Passwords

A potential security flaw in IBM i Access Client Solutions (ACS) has raised serious concerns…

3 hours ago

Weaponized VS Code Impersonate Zoom App Steals Cookies From Chrome

A newly identified extension for Visual Studio Code (VS Code) has been found to impersonate…

3 hours ago