CISA released two Industrial Control Systems (ICS) advisories on October 17, 2023. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
CISA encourages users and administrators to review the newly released ICS advisories for technical details and mitigations.
Highlights content goes here...
Summary
On October 17, 2023, the Cybersecurity and Infrastructure Security Agency (CISA) released two Industrial Control Systems (ICS) advisories to inform stakeholders about current security issues, vulnerabilities, and exploits affecting industrial control systems.
Advisory 1: ICSA-23-290-01 Schneider Electric EcoStruxure Power Monitoring Expert and Power Operation Products
This advisory pertains to Schneider Electric’s EcoStruxure Power Monitoring Expert and Power Operation products, which are used for monitoring and controlling power distribution systems. The advisory highlights a vulnerability in the products’ web-based interface that could allow an attacker to upload arbitrary files, potentially leading to unauthorized access and exploitation. CISA recommends that users and administrators:
1. Review the advisory for technical details on the vulnerability and mitigation instructions.
2. Apply the recommended patches and updates to vulnerable systems.
3. Implement additional security measures, such as web application firewalls and intrusion detection systems, to detect and prevent malicious activities.
Advisory 2: ICSA-23-290-02 Rockwell Automation FactoryTalk Linx
This advisory concerns Rockwell Automation’s FactoryTalk Linx, a software platform used for integrating industrial control systems with enterprise systems. The advisory warns of a vulnerability in the platform’s RESTful API that could enable unauthorized data manipulation and potentially lead to system compromise. CISA advises:
1. Review the advisory for technical details on the vulnerability and mitigation instructions.
2. Ensure that all systems and devices running FactoryTalk Linx are updated to the latest version.
3. Implement robust access controls and authentication mechanisms to restrict unauthorized access to the platform.
Recommendations
In light of these advisories, CISA recommends that users and administrators:
1. Review the advisories for technical details and mitigation instructions.
2. Apply corrective actions, such as patching and updating vulnerable systems, to address the identified vulnerabilities.
3. Implement additional security measures to detect and prevent malicious activities.
4. Ensure that all systems and devices are up-to-date with the latest software releases and security patches.
5. Continuously monitor systems for signs of compromise and report any incidents to CISA.
By following these recommendations, users and administrators can help minimize the risk of exploitation and ensure the security and reliability of their industrial control systems.