Three security vulnerabilities have been disclosed in operational technology (OT) products from Wago and Schneider Electric.
The deficiencies, per Forescout, are part of a broader set of deficiencies referred to collectively PL: ICEFALLwhich now consists of a total of 61 editions covering 13 different vendors.
“OT:ICEFALL demonstrates the need for stricter oversight of, and improvements to, processes related to secure design, patching, and testing at OT device vendors,” the company said. said in a report shared with The Hacker News.
The most severe weakness is CVE-2022-46680 (CVSS Score: 8.8), which concerns the plain text transmission of credentials in the ION/TCP protocol used by power meters from Schneider Electric.
A successful exploit of a bug can allow a threat actor to gain control of a vulnerable device. It should be noted that CVE-2022-46680 is one of 56 vulnerabilities that Forescout initially unearthed in June 2022.
Two other new security holes (CVE-2023-1619 And CVE-2023-1620CVSS score: 4.9) relates to a denial-of-service (DoS) bug affecting the WAGO 750 controller that an authenticated attacker can activate by sending certain flawed packets or special requests after logout.
In concluding the OT:ICEFALL research, Forescout noted that the vendor still lacks a fundamental understanding of secure design practices and that they released patches that were incomplete and failed to implement appropriate security testing procedures.
“This is worrying because as OT products start to implement security controls and eventually get certified, perceptions of their security posture may change and the sense of urgency around compensatory controls may drop – leading to a false sense of security,” the company said.