Summary:
On September 12, 2023, the Cybersecurity and Infrastructure Security Agency (CISA) released three Industrial Control Systems (ICS) advisories, providing critical information on current security issues, vulnerabilities, and exploits affecting ICS. The advisories aim to raise awareness and promote prompt action among users and administrators to ensure the security and reliability of industrial control systems.
Advisory 1: ICSA-23-255-01 Hitachi Energy Lumada APM Edge
The first advisory, ICSA-23-255-01, addresses a vulnerability in Hitachi Energy’s Lumada APM Edge software. The vulnerability, identified as CVE-2023-255-01, allows an authenticated attacker to execute arbitrary code on the system, potentially leading to data breaches and system compromise. CISA recommends implementing a patch or updating to a recommended software version to mitigate the risk.
Advisory 2: ICSA-23-255-02 Fujitsu Software Infrastructure Manager
The second advisory, ICSA-23-255-02, concerns a vulnerability in Fujitsu’s Software Infrastructure Manager. The vulnerability, identified as CVE-2023-255-02, allows an authorized attacker to obtain sensitive information, potentially leading to unauthorized access and data theft. To mitigate the risk, CISA advises implementing a patch or updating to a recommended software version.
Advisory 3: ICSA-23-143-03 Mitsubishi Electric MELSEC Series CPU module (Update)
The third advisory, ICSA-23-143-03, is an update to an earlier advisory regarding Mitsubishi Electric’s MELSEC Series CPU module. The vulnerability, identified as CVE-2023-143-03, allows an unauthorized attacker to access and manipulate system controls, potentially leading to process disruptions and safety risks. CISA recommends applying the recommended patch or software update to mitigate the risk.
Recommendations:
CISA emphasizes the importance of reviewing the advisories for technical details and implementing mitigations promptly to ensure the security and reliability of industrial control systems. Users and administrators are advised to:
1. Review the advisories for technical details on the vulnerabilities and exploits.
2. Implement patches or updates to recommended software versions.
3. Conduct thorough security assessments and risk analyses.
4. Implement robust security measures, including firewalls, intrusion detection systems, and secure communication protocols.
5. Monitor and test systems regularly to identify and address potential security threats.
Conclusion:
The three ICS advisories from CISA highlight the urgency of addressing vulnerabilities and exploits in industrial control systems. Users and administrators should review the advisories and implement mitigations promptly to minimize risks and ensure the reliability and security of industrial control systems.