On November 7, 2024, CISA released advisories about 3 critical security issues, vulnerabilities, and exploits related to Industrial Control Systems (ICS).
ICSA-24-312-01 Beckhoff Automation TwinCAT Package Manager:
CISA has identified a serious vulnerability in Beckhoff Automation’s TwinCAT Package Manager, a key software in manufacturing. The flaw, called CVE-2024-8934, relates to improper handling of special elements, making it susceptible to OS command injection attacks.
This vulnerability allows a local attacker with admin access to execute arbitrary commands, risking the system’s integrity and security.
Beckhoff Automation has released a security update, advising users to upgrade to version 1.0.613.0 to address a vulnerability. CISA also recommends that users check values entered by admins and limit network exposure to control systems to reduce exploitation risks.
ICSA-24-312-02 Delta Electronics DIAScreen:
CISA’s advisories highlighted several stack-based buffer overflow vulnerabilities in Delta Electronics’ DIAScreen equipment, which is mainly used in smart machine engineering and integrated into the DIAStudio Smart Machine Suite.
CVE-2024-47131, CVE-2024-39605, and CVE-2024-39354 are vulnerabilities that allow remote code execution in DIAScreen versions before v1.5.0. Attackers can exploit these to run arbitrary code remotely.
Delta Electronics has released v1.5.0 of DIAScreen and recommends that users update quickly to reduce risks.
ICSA-24-312-03 Bosch Rexroth IndraDrive:
A serious vulnerability in Bosch Rexroth’s IndraDrive equipment, vital for manufacturing, has been revealed by CISA. Known as CVE-2024-48989, it allows attackers to exploit uncontrolled resource consumption, leading to denial-of-service (DoS) attacks. By sending specific UDP messages to devices using the affected PROFINET stack, attackers can render the devices unresponsive, which may disrupt industrial operations.
The vulnerability has a CVSS v3.1 score of 7.5 and a CVSS v4 score of 8.7, indicating a high risk. Bosch Rexroth has not released a specific update, so organizations should take immediate action to reduce risks, such as isolating control systems from internet-facing networks.
CISA urges users to check the latest ICS advisories for important information and solutions.