Industrial Control Systems Advisories Released by CISA

The Cybersecurity & Infrastructure Security Agency (CISA) focuses on OT/ICS as the 2023 National Defense Authorization Act (NDAA) requires a complete inventory of OT/ICS systems and a comprehensive plan for staffing and training.

Original release date: December 20, 2022

CISA released six Industrial Control Systems (ICS) advisories on December 20, 2022. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.

CISA encourages users and administrators to review the newly released ICS advisories for technical details and mitigations:

1. ICSA-22-354-01 Fuji Electric Tellus Lite V-Simulator

1. EXECUTIVE SUMMARY

  • CVSS v3 7.8
  • ATTENTION: Low attack complexity 
  • Vendor: Fuji Electric
  • Equipment: Tellus Lite V-Simulator
  • Vulnerabilities: Out-of-bounds Write, Stack-based Buffer Overflow

2. RISK EVALUATION

Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code.

2. ICSA-22-354-02 Rockwell Automation GuardLogix and ControlLogix

1. EXECUTIVE SUMMARY

  • CVSS v3 7.8
  • ATTENTION: Low attack complexity 
  • Vendor: Fuji Electric
  • Equipment: Tellus Lite V-Simulator
  • Vulnerabilities: Out-of-bounds Write, Stack-based Buffer Overflow

2. RISK EVALUATION

Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code.

3. ICSA-22-354-03 ARC Informatique PcVue

1. EXECUTIVE SUMMARY

  • CVSS v3 7.8
  • ATTENTION: Low attack complexity 
  • Vendor: Fuji Electric
  • Equipment: Tellus Lite V-Simulator
  • Vulnerabilities: Out-of-bounds Write, Stack-based Buffer Overflow

2. RISK EVALUATION

Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code.

4. ICSA-22-354-04 Rockwell Automation MicroLogix 1100 and 1400

1. EXECUTIVE SUMMARY

  • CVSS v3 7.5
  • ATTENTION: Exploitable remotely/low attack complexity
  • Vendor: Rockwell Automation
  • Equipment: MicroLogix 1100 and 1400
  • Vulnerabilities: Cross-site Scripting, Improper Restriction of Rendered UI Layers or Frames

2. RISK EVALUATION

Successful exploitation of these vulnerabilities could create a denial-of-service condition or allow for remote code execution.

5. ICSA-22-354-05 Delta 4G Router DX-3021

1. EXECUTIVE SUMMARY

  • CVSS v3 7.5
  • ATTENTION: Exploitable remotely/low attack complexity
  • Vendor: Rockwell Automation
  • Equipment: MicroLogix 1100 and 1400
  • Vulnerabilities: Cross-site Scripting, Improper Restriction of Rendered UI Layers or Frames

2. RISK EVALUATION

Successful exploitation of these vulnerabilities could create a denial-of-service condition or allow for remote code execution.

6. ICSA-22-349-01 Prosys OPC UA Simulation Server (Update A)

1. EXECUTIVE SUMMARY

  • CVSS v3 6.5
  • ATTENTION: Exploitable remotely/low attack complexity
  • Vendor: Prosys OPC
  • Equipment: UA Simulation Server
  • Vulnerability: Insufficiently Protected Credentials

2. UPDATE INFORMATION

This updated advisory is a follow-up to the original advisory titled ICSA-22-349-01 Prosys OPC UA Simulation Server that was published December 15, 2022, to the ICS webpage on cisa.gov/ics.

3. RISK EVALUATION

Successful exploitation of this vulnerability could allow an attacker to obtain credentials and gain access to system data.