back to article Industrial control kit hackable, warn researchers

Multiple vulnerabilities in MOXA ioLogik controllers placed industrial facilities at risk if they do not apply patches. Applied Risk said it had found multiple vulnerabilities in the MOXA E1242 Ethernet remote I/O series, a widely used range of kit used in industrial facilities such as utilities and manufacturing plants. Code …

  1. Anonymous Coward
    Anonymous Coward

    More IOT mess

    This is typical of all devices being opened up to the public internet without enough scrutiny whatsoever. And all this while incompetent governments doze away... Wake up people before the world gets taken over by maniacs driving/controlling our infrastructure.

  2. Anonymous Coward
    Anonymous Coward

    What are these controllers doing out on the internet?

    Production equipment should never be seen out on the web no matter what the MBAs and bean counters want.

    If head office wants contact with the equipment at a remote site it should be down a dedicated line by air gapped computers at head office.

  3. Filippo Silver badge

    I use similar stuff, from MOXA and from other manufacturers. The quality of their software is roughly the same; MOXA is not particularly bad. Put plainly, this type of device should under NO circumstances be accessible from outside the local network.

    IoT is a mess in its own right, but at least it's something that's supposed to be on the Internet. These things are *NOT* IoT. They are replacements for objects that used to sit on a PCI bus, and have the same concern about security as something that sits on a PCI bus.

    1. thames

      I just had a look at their web site to see what the product is. It's a bog standard remote I/O card. These sorts of products used to use RS-485 or proprietary media. Manufacturers have been switching to Ethernet in order to use standard chip sets, cables, connectors, and other hardware.

      You don't put these things on the Internet. They're not that type of module. They're intended to be embedded in a machine (which can be a very large machine) on their own network. The reason they use a network connection is to reduce cabling. The "old" way of doing this would have been to run masses of individual wires from the valve or switch back to racks of I/O cards mounted in a central cabinet. That was expensive, labour intensive, and unreliable (try tracing a flaky connection or signal cross-talk from junction box to junction box some time - not fun). Then they went to proprietary networks, which were expensive, often unreliable, and poorly supported. Now you just run power and an Ethernet cable to the module. There's an embedded switch in each module so you can daisy-chain them, just like you would have with RS-485.

      The web interface will be to let you configure the module for such things as address and a few other options. Of course if you have access to the network you can simply ignore the web interface and send standard industrial commands to it to do whatever you want with the I/O without needing any passwords. This is why I have to laugh at the drama in some of these types of stories. Security for these types of devices is supposed to be physical isolation. Don't hook them up to anything that isn't supposed to be able to talk to them. I very much doubt that most customers even bother to change the default passwords anyway. They're not the IoT.

      For those who think this sort of thing is a big problem, then here's something for you to worry about. Did you know that you can plug a keyboard, mouse, and monitor into any desktop PC without any security authorisation at all? Astonishing, isn't it! Industrial I/O devices are a machine's equivalent to keyboards and monitors. If you decide to hook them up to the Internet, then it's up to you to provide the necessary security by some external means. Industrial I/O vendors are not in the security business and they shouldn't try to be. If you need security, go to a security specialist and add the security on as a separate firewall/filter/whatever box (there are companies that do this).

  4. You aint sin me, roit
    Facepalm

    It's the thought process that hurts...

    "Let's put it on the internet, so we can access it from anywhere!"

    "Won't that be insecure?"

    "We'll use a password!"

    "But someone might eavesdrop..."

    "So... we could hash the password, then it won't be in clear!"

    "Oh yes, that's good. And let's use... MD5!!"

    1. TRT Silver badge

      Re: It's the thought process that hurts...

      Almost as bad as NCIS. "The mines are triggered by a needle laser trip wire that communicates by encrypted wifi to detonate mines simultaneously..." because wifi now means radio, right kids? And encrypted means unblockable without Herculean effort that yields the key at one second before detonation.

  5. NBNnigel

    Huh. So this is why HP all of a sudden released a security advisory for their server management interfaces: iLO (and brethren) runs on moxa hardware (http://www8.hp.com/us/en/business-services/it-services/security-vulnerability.html#!&pd1=1_2). Anyone running HP 'Integrity Superdome' should be firmware updating ASAP. Assuming you're not out of warranty. Or you have paid the HP firmware ransom (i.e. you purchased a 'HP care pack'). And assuming you can find the firmware and instructions, cleverly concealed somewhere on the HPE website/monstrosity.

    From HP's sec advisory page: "This vulnerability could allow an unauthenticated, remote attacker to perform man-in-the-middle attack (MITM) or redirect outbound traffic to an arbitrary server that can cause disclosure of sensitive information."

    So of course it makes perfect sense that HP have marked mitigating firmware as 'entitlement required'. Everyone else running HP server management interfaces (e.g. iLO): HP's suggested 'workaround' is to "disable System Management Homepage".

    Good luck and godspeed!

  6. Anonymous Coward
    Anonymous Coward

    Missed oppportunity

    Why is this article not sub-titled "No shit sherlock" ... I mean seriously?

    1. s5PGmU

      Re: Missed oppportunity

      or "Captain Obvious strikes again!"

      1. Stoneshop
        Holmes

        "Captain Obvious strikes again!"

        Captain Oblivious, rather.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like