Researchers have disclosed particulars of three new safety vulnerabilities affecting operational know-how (OT) merchandise from CODESYS and Festo that might result in supply code tampering and denial-of-service (DoS).
The vulnerabilities, reported by Forescout Vedere Labs, are the most recent in a protracted listing of flaws collectively tracked underneath the identify OT:ICEFALL.
“These points exemplify both an insecure-by-design method — which was ordinary on the time the merchandise had been launched – the place producers embrace harmful features that may be accessed with no authentication or a subpar implementation of safety controls, reminiscent of cryptography,” the researchers mentioned.

Probably the most crucial of the issues is CVE-2022-3270 (CVSS rating: 9.8), a crucial vulnerability that impacts Festo automation controllers utilizing the Festo Generic Multicast (FGMC) protocol to reboot the gadgets with out requiring any authentication and trigger a denial of service (DoS) situation.
One other DoS shortcoming in Festo controllers (CVE-2022-3079, CVSS rating: 7.5) pertains to a case of unauthenticated, distant entry to an undocumented internet web page (“cec-reboot.php”) that may very well be exploited by an attacker with community entry to Festo CPX-CEC-C1 and CPX-CMXX PLCs.

The third difficulty, however, considerations using weak cryptography within the CODESYS V3 runtime setting to safe obtain code and boot functions (CVE-2022-4048, CVSS rating: 7.7), which may very well be abused by a foul actor to decrypt and manipulate the supply code, thereby undermining confidentiality and integrity protections.
Forescout mentioned it additionally recognized two identified CODESYS bugs impacting Festo CPX-CEC-C1 controllers (CVE-2022-31806 and CVE-2022-22515) that stem from an unsafe configuration within the Management runtime setting, and will result in a denial-of-service sans authentication.
“That is yet one more instance of a provide chain difficulty the place a vulnerability has not been disclosed for all of the merchandise it impacts,” the researchers mentioned.
To mitigate potential threats, organizations are beneficial to find and stock weak gadgets, implement acceptable community segmentation controls, and monitor community site visitors for anomalous exercise.