CISA’s ICS Advisories – August 2022
To provide more information on the evolving threat landscape for ICS, Verve’s research team analyzed the various ICS advisories and CVEs that were released in August 2022.
Learn MoreSubscribe to stay in the loop with the latest OT cyber security best practices.
To provide more information on the evolving threat landscape for ICS, Verve’s research team has been looking at the various ICS advisories and CVEs that have been released in the last couple of weeks
With CISA kicking off Cybersecurity Awareness Month in October, we look back to the month of September, where the team analyzed a total of 26 new ICS advisories. From those advisories, Verve observed the following data points:
While those vulnerabilities can all be relevant to an asset owner or cybersecurity professional, some of the advisories stand out.
The following advisories/vulnerabilities stand out from the others:
Other vulnerabilities could also be listed above, such as ICSA-22-251-01 which has a CVSS rating of 10, ICSA-22-258-02 & ICSA-22-258-05, 2 advisories on Siemens assets that have 20 & 14 CVEs associated with them, and other critical vulnerabilities that asset owners/engineers should investigate to ensure that they mitigate the risks that these vulnerabilities could entail to the environment they manage/maintain.
When it comes to ICS advisories, CISA gives a good list of vulnerabilities that can potentially be exploited by a threat actor in order to compromise a given asset/product. The advisories generally give one or two “warnings” – Some rare ones don’t have any warnings – about how easily a threat actor could potentially exploit those advisories/vulnerabilities. The most common warnings are “Low attack complexity” and “Exploitable remotely“.
Other warnings that can be seen on CISA’s website include:
Those warnings can often give a general idea of the level of skills needed by a threat actor in order to exploit one of the vulnerabilities.
In September, 14 advisories of the 26(54%) could be both exploited remotely and had low attack complexity, 6 only had a low attack complexity, 3 were only exploitable remotely and 3 advisories were divergent from the rest of the group:
So, while some of the advisories might have really high CVEs associated to them, it doesn’t mean that they can easily be exploited. In order to properly understand their risks, organizations need to ensure that they don’t just look at the vulnerability scores, but also how they can be exploited, what those different assets mentioned in the advisory are connected to, their criticality and the impact an exploit could have on the organization, its operations, its data and of course safety.
In other words, organizations need to ensure they understand their network, have information on their endpoint and don’t forget to mitigate risks, put in place compensating controls, and perform risk/threat/vulnerability management activities.
With all of this in mind, what can asset owners expect for the coming months? Last year(2021) saw ICS-CERT release 354 ICS-related advisories spanning 82 vendors/OEMs, 1,198 CVEs containing references to different products, and a matrix of affected versions. With an average advisory score of 7.91 and an average number of 3.38 CVEs per advisory for 2021, how does it compare to the current year?
Based on what is available so far, it can be analyzed that 2022 might bring:
Verve Industrial’s mission is to help industrial clients ensure the security and reliability of their most critical assets: their industrial control systems. Verve brings over 25 years of ICS/OT controls experience to help clients achieve rapid and lasting improvement in their Operational Technology (OT) security.
Our foundation in industrial controls engineering is core to our mission to help operators protect these critical assets that keep modern civilization operating effectively. We act as a true partner to our clients in their security and reliability journey. We walk alongside our clients to help them increase the maturity of their systems and processes over time.
One of the key challenges our clients face is the flood of new vulnerabilities released each year for ICS. They are often overwhelmed by the scale of these emerging risks. Our goal with this analysis is to bring some clarity to the task at hand, some visibility into the types of threats, and some recommendations about what actions an organization can take to address these risks.
To provide more information on the evolving threat landscape for ICS, Verve’s research team analyzed the various ICS advisories and CVEs that were released in August 2022.
Learn MoreDownload the 2021-22 ICS Advisory Report to uncover our key findings and predictions for what's to come.
Learn MoreSweat it or forget it: An ICS insider's guide to navigating ICS advisories - A presentation by Ron Brash during Public Safety Canada's 2021 event
Learn More