Significant ICS Vulnerabilities Identified in Q1 2025
Global Overview of Vulnerabilities in APCS
With the rapid development of digital technologies and automation of production processes, process control systems (APCS) play a key role in ensuring the smooth operation of critical infrastructure in Kazakhstan, including energy, oil and gas, and industrial production. These systems ensure the stability and efficiency of facilities, but their complexity and interconnectedness make them an attractive target for cyber threats. As the dependence on automated solutions increases, so does the risk of exploiting vulnerabilities that can disrupt the functioning of critical systems.
In the first quarter of 2025, significant vulnerabilities in APCS were identified affecting equipment and software from leading manufacturers such as Siemens, Schneider Electric, and Rockwell Automation, highlighting the need for increased attention to cybersecurity issues. These vulnerabilities pose a threat to the security of critical infrastructure facilities, and timely elimination of these problems and the implementation of protective measures are priorities to ensure the sustainability of technological processes. Below is an overview of the key vulnerabilities identified in Q1 2025, describing the affected systems, types and severity, potential impact, and remediation recommendations.
Siemens Sinamics S200 (servo drives)
Manufacturer: Siemens
CVE: CVE-2024-56336
Type of affected systems: Sinamics S200 servo drives
Type and severity: Critical firmware bootloader vulnerability (CVSS 9.5)
Vulnerability description: An unlocked firmware bootloader could allow an attacker with physical or network access to the device to load malicious code or unauthorized software.
Mitigation Recommendations: To operate devices in a secure IT environment, Siemens recommends configuring the environment in accordance with the Siemens Industrial Security Guide (download: https://www.siemens.com/cert/operational-guidelines-industrial-security) and following the recommendations in the product manuals.
Schneider Electric System Monitor (industrial PCs)
Manufacturer: Schneider Electric
Type of affected systems: Harmony and Pro-face industrial computers
Type and severity: Critical credential disclosure vulnerability (CVSS: 9.8)
Vulnerability description: Sensitive information disclosure when sending specially crafted HTTP requests, which could allow an attacker to obtain credentials without authorization.
Recommendations for troubleshooting:
• disable or remove the System Monitor application if its use is not required by stopping the services as described in the Harmony Industrial PC Series User Manual and Pro-face PS5000 legacy industrial PC Series User Manual;
• segment the network and configure the firewall to block unauthorized access to HTTP/HTTPS ports.
Schneider Electric PLC Modicon M580 and BMENOR2200H module
Manufacturer: Schneider Electric
CVE: CVE-2024-11425
Type of affected systems: Modicon M580 programmable logic controllers and BMENOR2200H module
Type and severity: High vulnerability due to incorrect calculation of the buffer size (CVSS 8.7)
Vulnerability description: The vulnerability is related to incorrect calculation of the buffer size in the controller's web server. Exploitation of the vulnerability may allow an attacker to initiate a denial of service (DoS) attack by sending a specially crafted HTTPS packet.
Recommended solutions:
• update the firmware to the fixed versions (SV4.30 for standard models, SV4.21 for secure models, version 1.3.10 for EVLink Pro AC charging stations);
• restrict network access to the controllers, in particular, close external access to port 443/TCP.
Rockwell Automation FactoryTalk AssetCentre
Vendor: Rockwell Automation
CVE: CVE-2025-0477
Type of affected systems: FactoryTalk AssetCentre asset management system
Type and severity: Critical cryptographic protection vulnerability (CVSS 9.3)
Description of vulnerability: Insufficient cryptographic protection of data used before version 15.00.01 could allow an attacker to extract user passwords from encrypted data and perform privilege escalation.
Remediation recommendations:
• Upgrade FactoryTalk AssetCentre to version 15.00.01 or later;
• Control access to the database where encrypted data is stored, restricting it to non-core users;
• Restrict access to the database in accordance with the principle of least privilege.
Status of APCS vulnerabilities in Kazakhstan
During monitoring of the Kazakhstan segment of the Internet, the National Coordination Center for Information Security identified a number of IP addresses using the Modbus protocol (port 502) and the IEC 60870-5-104 protocol (port 2404).
Both protocols are widely used in automated process control systems and critical infrastructure, making them particularly vulnerable to attacks.
Analysis of the identified IP addresses revealed that they belong to organizations operating in key industries such as energy, industry, automation, and construction. These companies manufacture and supply equipment for metering electric and thermal energy, water, and gas, as well as develop innovative solutions for energy distribution. In addition, the organizations implement projects that require high qualifications in the field of construction, ecology, and radiation safety, and are also engaged in the development of specialized software for various industries.
The Modbus protocol was developed in 1979 and initially did not provide for modern cybersecurity requirements. It provides data exchange between devices in automation systems, such as controllers, sensors, and SCADA systems. At the same time, Modbus lacks authentication and encryption mechanisms. This means that anyone who gains access to the network can send commands or intercept data, making the system vulnerable to attacks. Upon further analysis, one of the IP addresses was found to contain the Schneider Electric TM200CE24T V0.2 equipment, used in industry, energy, transport and other fields. TM200CE24T is part of the Schneider Electric controller line. When assessing the security of this device, it is important to consider possible vulnerabilities found in other Schneider Electric models and software. In particular, vulnerabilities related to Modbus TCP protocols (for example: CVE-2021-22779) can pose potential risks such as authentication bypass and remote code execution. These vulnerabilities are common to some other Schneider Electric controller models and may serve as a basis for increased attention to the information security of TM200CE24T V0.2. The IEC 60870-5-104 protocol is designed for real-time data transmission in telemetry and SCADA systems, especially in the energy sector. It runs on TCP/IP and provides management of infrastructure objects. However, like Modbus, this protocol does not have built-in security mechanisms. This makes it vulnerable to MITM attacks, message spoofing, and reuse of previously sent commands.
Port 2404 on the Internet, used by the IEC 60870-5-104 protocol, is designed to transmit data in telemetry systems and functionally provides access to control signals and telemetry data. If it is open to public Internet access, attackers can access this data and even interfere with the control of objects, which can lead to serious consequences, such as disruption of power grids or shutdown of critical equipment. Also, the presence of an open port 2404 on discovered IP addresses allows attackers to access telemetry data or control signals. This increases the risk of DoS/DDoS attacks that can overload the system, disable critical processes, or even disrupt the operation of entire infrastructure facilities. In conclusion, it is safe to say that cybersecurity for APCS requires special attention. The vulnerabilities we discovered in the Modbus and IEC 60870-5-104 protocols indicate the need to modernize approaches to protecting such systems.
The lack of built-in security mechanisms makes these protocols an easy target for intruders, which can lead to the shutdown of production processes, data leakage, or equipment damage. This is especially dangerous for critical infrastructure facilities, where such failures can lead to serious economic and social consequences.
To minimize the risks associated with the identified vulnerabilities, the National Coordination Center for Information Security has prepared recommendations.
• Timely install updates and patches provided by manufacturers.
• Segment control networks, isolating them from external and internal networks.
• Eliminate access to control systems from the Internet. Place control networks and remote devices behind firewalls and isolate them from the corporate network.
• Restrict remote access using VPN and multi-factor authentication.
• Check all media intended for data exchange (e.g. USB drives, CDs) before using them in isolated network segments.
• Apply strict password policies and regularly update credentials.
• Implement network activity monitoring to identify anomalies.
• Conduct regular security audits and train personnel in the principles of cybersecurity in an industrial environment.
Compliance with these measures will reduce the likelihood of exploitation of vulnerabilities and ensure the reliability of APCS systems in the face of modern cyber threats.
References:
https://cert-portal.siemens.com/productcert/html/ssa-787280.html
https://www.cisa.gov/news-events/ics-advisories/icsa-25-030-03
https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1721.html