Skip to main content

Validation of ICS Vulnerability Related to TCP/IP Protocol Implementation in Allen-Bradley Compact Logix PLC Controller

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1053))

Abstract

Industrial Control Systems (ICS) research and testing process was implemented to validate the existence of a well known security vulnerability in a Rockwell Automation Allen-Bradley Compact Logix PLC controller. The study was conducted considering a public advisory from the manufacturer, which includes a large list of families of affected products by the vulnerability. The established hypothesis of the study considered the existence of the vulnerability in a specific available PLC model, included by Rockwell Automation manufacturer in the list of affected products. An exploit was developed and multiple testing was performed to trigger the vulnerability.

Testing methodology and results indicates there is sufficient evidence to establish that Rockwell Automation Allen-Bradley Compact Logix 5370 L2 controllers, are not affected by the same type of Improper Input Validation vulnerability, than the Compact Logix 5370 L3 controllers, as it was stated by the manufacturer in a public advisory.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. ICS CERT US Homepage. https://ics-cert.us-cert.gov/advisories/ICSA-18-172-02. Accessed 15 June 2019

  2. APPLIED RISK Homepage. https://www.applied-risk.com/resources/ar-2018-002. Accessed 15 June 2019

  3. NCICC Homepage. https://www.us-cert.gov/. Accessed 15 June 2019

  4. NIST Homepage. https://nvd.nist.gov/vuln/detail/CVE-2017-9312. Accessed 15 June 2019

  5. MITRE Homepage. http://cwe.mitre.org/data/definitions/20.html. Accessed 15 June 2019

  6. RFC Homepage. https://www.rfc-editor.org/info/rfc793. Accessed 15 June 2019

  7. RFC Homepage. https://www.rfc-editor.org/info/rfc791. Accessed 15 June 2019

  8. Serhane, A., Raad, M. Raad, R., Susilo, W.: PLC Code-level vulnerabilities. In: 3rd International Conference on Computer and Applications (ICCA), Beirut, Lebanon, pp 348–352. IEEE (2018)

    Google Scholar 

  9. Lee, R., Assante, M., Conway, T.: Analysis of the cyber attack on the Ukrainian power grid. Technical report, E-ISAC, Washington, DC (2016)

    Google Scholar 

  10. Echeverri, D.: Hacking with Python. Zeroxword Computing, Madrid (2015)

    Google Scholar 

  11. Echeverri, D.: Python for Pentesters. Zeroxword Computing, Madrid (2014)

    Google Scholar 

  12. Krotofil, M., Gollmann, D.: Industrial control systems security - what is happening? In: 11th International Conference on Industrial Informatics (INDIN), Bochum, Germany, pp 664–669. IEEE (2013)

    Google Scholar 

  13. Milinkovic, S., Lazic, Ljubomir.: Industrial PLC security issues. In: 20th Telecommunications Forum (TELFOR), Belgrade, Serbia, pp. 1536–1539. IEEE (2012)

    Google Scholar 

  14. CVE Details Homepage. https://www.cvedetails.com/cve/CVE-2016-9343. Accessed 15 June 2019

  15. NIST Homepage. https://nvd.nist.gov/vuln/detail/CVE-2016-9343. Accessed 15 June 2019

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jaime Pavesi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pavesi, J., Villegas, T., Perepechko, A., Aguirre, E., Galeazzi, L. (2019). Validation of ICS Vulnerability Related to TCP/IP Protocol Implementation in Allen-Bradley Compact Logix PLC Controller. In: Mata-Rivera, M., Zagal-Flores, R., Barría-Huidobro, C. (eds) Telematics and Computing. WITCOM 2019. Communications in Computer and Information Science, vol 1053. Springer, Cham. https://doi.org/10.1007/978-3-030-33229-7_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-33229-7_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-33228-0

  • Online ISBN: 978-3-030-33229-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics