Abstract
Industrial Control Systems (ICS) research and testing process was implemented to validate the existence of a well known security vulnerability in a Rockwell Automation Allen-Bradley Compact Logix PLC controller. The study was conducted considering a public advisory from the manufacturer, which includes a large list of families of affected products by the vulnerability. The established hypothesis of the study considered the existence of the vulnerability in a specific available PLC model, included by Rockwell Automation manufacturer in the list of affected products. An exploit was developed and multiple testing was performed to trigger the vulnerability.
Testing methodology and results indicates there is sufficient evidence to establish that Rockwell Automation Allen-Bradley Compact Logix 5370 L2 controllers, are not affected by the same type of Improper Input Validation vulnerability, than the Compact Logix 5370 L3 controllers, as it was stated by the manufacturer in a public advisory.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
ICS CERT US Homepage. https://ics-cert.us-cert.gov/advisories/ICSA-18-172-02. Accessed 15 June 2019
APPLIED RISK Homepage. https://www.applied-risk.com/resources/ar-2018-002. Accessed 15 June 2019
NCICC Homepage. https://www.us-cert.gov/. Accessed 15 June 2019
NIST Homepage. https://nvd.nist.gov/vuln/detail/CVE-2017-9312. Accessed 15 June 2019
MITRE Homepage. http://cwe.mitre.org/data/definitions/20.html. Accessed 15 June 2019
RFC Homepage. https://www.rfc-editor.org/info/rfc793. Accessed 15 June 2019
RFC Homepage. https://www.rfc-editor.org/info/rfc791. Accessed 15 June 2019
Serhane, A., Raad, M. Raad, R., Susilo, W.: PLC Code-level vulnerabilities. In: 3rd International Conference on Computer and Applications (ICCA), Beirut, Lebanon, pp 348–352. IEEE (2018)
Lee, R., Assante, M., Conway, T.: Analysis of the cyber attack on the Ukrainian power grid. Technical report, E-ISAC, Washington, DC (2016)
Echeverri, D.: Hacking with Python. Zeroxword Computing, Madrid (2015)
Echeverri, D.: Python for Pentesters. Zeroxword Computing, Madrid (2014)
Krotofil, M., Gollmann, D.: Industrial control systems security - what is happening? In: 11th International Conference on Industrial Informatics (INDIN), Bochum, Germany, pp 664–669. IEEE (2013)
Milinkovic, S., Lazic, Ljubomir.: Industrial PLC security issues. In: 20th Telecommunications Forum (TELFOR), Belgrade, Serbia, pp. 1536–1539. IEEE (2012)
CVE Details Homepage. https://www.cvedetails.com/cve/CVE-2016-9343. Accessed 15 June 2019
NIST Homepage. https://nvd.nist.gov/vuln/detail/CVE-2016-9343. Accessed 15 June 2019
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Pavesi, J., Villegas, T., Perepechko, A., Aguirre, E., Galeazzi, L. (2019). Validation of ICS Vulnerability Related to TCP/IP Protocol Implementation in Allen-Bradley Compact Logix PLC Controller. In: Mata-Rivera, M., Zagal-Flores, R., Barría-Huidobro, C. (eds) Telematics and Computing. WITCOM 2019. Communications in Computer and Information Science, vol 1053. Springer, Cham. https://doi.org/10.1007/978-3-030-33229-7_30
Download citation
DOI: https://doi.org/10.1007/978-3-030-33229-7_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-33228-0
Online ISBN: 978-3-030-33229-7
eBook Packages: Computer ScienceComputer Science (R0)