Researchers at cybersecurity firm Nozomi Networks Labs have identified five vulnerabilities in Mitsubishi's safety programmable logic controllers (PLCs), centered on the authentication implementation of the MELSOFT communication protocol. Although Mitsubishi has developed a strategy to patch the vulnerabilities, the researchers stress that software updates take longer to deploy for safety PLCs or medical devices.
"Depending on the type of device and regulatory framework, the certification procedure could be required for each individual software update," the researchers say in a blog post. More than one vendor likely was affected by the issues, they say.
Among other things, the researchers found that attackers could reuse session tokens generated after successful authentication. "If we chain together some of the identified vulnerabilities, several attack scenarios emerge," they say.
However, attackers are unable to access the MELSOFT authentication or authenticated packets in cleartext, the researchers say.
View Full Article
Abstracts Copyright © 2021 SmithBucklin, Washington, DC, USA