Sign In

Communications of the ACM

ACM TechNews

Security Company Warns of Mitsubishi Industrial Control Vulnerabilities

View as: Print Mobile App Share:
Mitsubishi programmable logic controller

Mitsubishi safety PLC owners are asked to assess their security posture and take general mitigations until patches are available.

Researchers at cybersecurity firm Nozomi Networks Labs have identified five vulnerabilities in Mitsubishi's safety programmable logic controllers (PLCs), centered on the authentication implementation of the MELSOFT communication protocol. Although Mitsubishi has developed a strategy to patch the vulnerabilities, the researchers stress that software updates take longer to deploy for safety PLCs or medical devices.

"Depending on the type of device and regulatory framework, the certification procedure could be required for each individual software update," the researchers say in a blog post. More than one vendor likely was affected by the issues, they say.

Among other things, the researchers found that attackers could reuse session tokens generated after successful authentication. "If we chain together some of the identified vulnerabilities, several attack scenarios emerge," they say.

However, attackers are unable to access the MELSOFT authentication or authenticated packets in cleartext, the researchers say.

From ZDNet
View Full Article


Abstracts Copyright © 2021 SmithBucklin, Washington, DC, USA


No entries found

Sign In for Full Access
» Forgot Password? » Create an ACM Web Account