Vulnerability Testing of Industrial Network Devices



Similar documents
ModbusFW Deep Packet Inspection for Industrial Ethernet

Firewalls. Chapter 3

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Achilles Assurance Platform. Dr. Nate Kube Founder / CTO Wurldtech

CMPT 471 Networking II

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Linux Network Security

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

How To Classify A Dnet Attack

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Network Access Security. Lesson 10

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Designing a security policy to protect your automation solution

Patch and Vulnerability Management Program

Secure Networks for Process Control

INTRODUCTION TO FIREWALL SECURITY

ACHILLES CERTIFICATION. SIS Module SLS 1508

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Innovative Defense Strategies for Securing SCADA & Control Systems

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

Introduction of Intrusion Detection Systems

Critical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

CS5008: Internet Computing

Firewall VPN Router. Quick Installation Guide M73-APO09-380

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Multi-Homing Dual WAN Firewall Router

Chapter 8 Security Pt 2

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Denial Of Service. Types of attacks

A S B

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

CIT 380: Securing Computer Systems

CYBER SECURITY. Is your Industrial Control System prepared?

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Using Nessus to Detect Wireless Access Points. March 6, 2015 (Revision 4)

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

The Nexpose Expert System

Chapter 8 Network Security

CISCO IOS NETWORK SECURITY (IINS)

Security Issues with Distributed Web Applications

Cisco Advanced Services for Network Security

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

Firewalls. Ahmad Almulhem March 10, 2012

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Security Testing in Critical Systems

GE Measurement & Control. Cyber Security for NEI 08-09

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

HIPAA Risk Analysis By: Matthew R. Johnson GIAC HIPAA Security Certificate (GHSC) Practical Assignment Version 1.0 Date: April 12, 2004

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION

On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Security vulnerabilities in the Internet and possible solutions

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Reclamation Manual Directives and Standards

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals

Web Application Security

Industrial Security for Process Automation

Ti m b u k t up ro. Timbuktu Pro Enterprise Security White Paper. Contents. A secure approach to deployment of remote control technology

CSCE 465 Computer & Network Security

Denial of Service Attacks

Introduction TELE 301. Routers. Firewalls

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

This chapter covers the following topics:

Information Security Assessment and Testing Services RFQ # Questions and Answers September 8, 2014

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Securing EtherNet/IP Using DPI Firewall Technology

Packet Sniffer Detection with AntiSniff

For more information or call

LOGIIC Remote Access. Final Public Report. June LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION

Payment Card Industry (PCI) Data Security Standard

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Cyber Essentials. Test Specification

Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media

Secure Software Programming and Vulnerability Analysis

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

Firewalls. Network Security. Firewalls Defined. Firewalls

Basic Network Configuration

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Attack Lab: Attacks on TCP/IP Protocols

6WRUP:DWFK. Policies for Dedicated SQL Servers Group

CCT vs. CCENT Skill Set Comparison

Voice over IP (VoIP) Vulnerabilities

Transcription:

Vulnerability Testing of Industrial Network Devices Matthew Franz (mfranz@cisco.com) Critical Infrastructure Assurance Group (CIAG) http://www.cisco.com/go/ciag 2003, Cisco Systems, Inc. All rights reserved. 1

Overview Introduction Background Related research & testing Objectives & Methodology Summary of testing and analysis Conclusions and recommendations 2001, Cisco Systems, Inc. All rights reserved. 2

Industrial Network Security: the Big Picture Increasing adoption of Open/COTS/Non-Proprietary technology for critical applications Increasing adoption of Ethernet, Wireless and TCP/IP coupled with a disappearing boundary between industrial and enterprise networks Large numbers of production devices and protocols with weak to non-existent security features Significant cultural/technical gaps between IT and control engineers regarding Cyber Security A lot of FUD, but few specific details about vulnerabilities (although that is starting to change) 2001, Cisco Systems, Inc. All rights reserved. 3

Industrial Network Security: Open Issues Will industrial devices be subject to the same design, implementation, and configuration vulnerabilities that plague IT products? How well do existing security products meet the needs of industrial devices, networks, and protocols? What new security technologies are needed to protect industrial networks? Do industrial vendors have the infrastructure to handle vulnerability identification and disclosure? 2001, Cisco Systems, Inc. All rights reserved. 4

Known vulnerabilities in control system networks Design Insecure comm links Insecure devices & protocols Less than weak authentication in devices and protocols Insecure remote access (i.e. modems) Undocumented commands/backdoors Implementation TCP/IP stack issues? Protocol flaws? OS/App flaws? Windows HMI Flaws WEP Flaws Network infrastructure device DoS Configuration 802.11 Defaults (no WEP) Weak/default passwords Inadequate filtering on router/firewall OS defaults and failure to apply patches & upgrades Ill-defined or unrealistic security requirements Insecure coding practices and inadequate testing Default insecure features and difficult/non-scalable features 2001, Cisco Systems, Inc. All rights reserved. 5

Related Cisco CIAG Projects SCADA Protocol Vulnerability analysis and testing Modbus/TCP support for Linux Netfilter http://modbusfw.sourceforge.net Factory Automation Security Plant floor architecture using Cisco hardware and software security solutions (PIX, VPN, ACS, 2955) Virtual SCADA HoneyNets Simulate multiple devices, protocols, and networks to gather attack data and raise awareness of intrusion points Open Source (Java) AGA 12-1 Reference Implementation http://scadasafe.sourceforge.net/ 2001, Cisco Systems, Inc. All rights reserved. 6

A Pen-Test Post (August 2003) What concerns me is the number of process control devices that are now offering embedded HTTP servers, connectivity over IP, etc. Given the reported vulnerabilities on Bugtraq, etc, w.r.t embedded IP stacks in devices like JetDirect cards and the like, I would to know how reliable the IP stacks are in those devices. http://www.securityfocus.org/archive/101/329129/2003-07-10/2003-07-16/2 2001, Cisco Systems, Inc. All rights reserved. 7

Is there really a threat? I m not even directly connected to the Internet The traditional perimeter is eroding SOHO/VPN, wireless, dial-up, partner connectivity Multiple application entry points SMB, Email, Web Browser, Web Server Worms and viruses only target Windows machines Network infrastructure devices aren t directly targeted either, but end up as collateral damage what happens to automation devices? Instead of attacking windowsupdate.com or whitehouse.gov write your worm to The bottom line security controls must be integrated throughout the network and end-devices must be hardened 2001, Cisco Systems, Inc. All rights reserved. 8

Methodology Apply lessons learned from network infrastructure devices to devices and networks stacks used in control systems PLC Communication Modules Internet-enabled IO devices Ethernet-enabled Microcontrollers Generic purpose RTOS Determine the impact of known attacks and identify remedies both in the network and the implementation No vendors or specific devices will be identified, so don t ask! 2001, Cisco Systems, Inc. All rights reserved. 9

Objectives Survey vulnerabilities and security features in Ethernet-enabled devices Focus on low-hanging fruit conduct known attacks against TCP/IP protocols and applications Avoided automation protocols such as Modbus/TCP, Ethernet/IP, Fieldbus HSE, etc. Provide reasonable baselines for what is possible now and provide data to support long-term enhancement (vs. security wish-list) Stimulate further testing and research by vendors, users, and researchers 2001, Cisco Systems, Inc. All rights reserved. 10

Testing & Analysis TCP/UDP Scans OS fingerprinting TCP Initial Sequence Number Entropy TCP Resource Exhaustion Applications Information Discovery Protocols Embedded Web Servers Miscellaneous security features 2001, Cisco Systems, Inc. All rights reserved. 11

Port Scans and Stack Fingerprinting Overview A variety of techniques can be used to identify which applications, protocols are present and to determine the signature of a network device Determine which TCP/UDP and IP Protocol (i.e. IGMP) are active Results From 1-2 UDP to 10-15 ports open Simple port scans (of 200-300) ports did cause some devices and applications to become unresponsive Non-standard protocol behavior prohibited scanning in many cases lack of UDP port unreachable and SYN- ACK from closed ports OS Fingerprinting not as effective as against general purpose OS s devices not yet in the database 2001, Cisco Systems, Inc. All rights reserved. 12

TCP Resource Exhaustion Goal is to exhaust memory or connections via a relatively small number of packets not link layer saturation SYN Floods are most well known, but attacks can occur at anytime during the 3-way handshake Number of connections and timeouts are critical Results (best to worst case) Quick timeout and recovery impact ended once attack stopped Prevented any new connection attempts to the port under attack or all TCP-based Terminated existing TCP sessions Complete lockup/crash of device (automatic/manual reboot) 2001, Cisco Systems, Inc. All rights reserved. 13

TCP Initial Sequence Number Randomness Technique Send SYN record sequence number in SYN-ACK segment Allows a remote blind attacker to hijack or terminate the TCP sessions Results Fixed/time incremental sequence numbers used on majority devices Able to exploit this to terminate sessions TCP Sequence number entropy issues were fixed in mid/late-1990s in general purpose devices and network devices 2001, Cisco Systems, Inc. All rights reserved. 14

Discovery Protocols Majority of devices have a proprietary UDP protocol used to initially identify and configure the device Windows configuration application sends a single broadcast/multicast packet to subnet Device responds with name of vendor, type of device, and firmware version (worst case) Password authentication may/may not be required to configure device Trivial to craft discovery packets with a sniffer and simple packet-generators Some devices used vendor-specific capabilities of an open protocol (such as Modbus/TCP) instead of proprietary discovery protocol use 2001, Cisco Systems, Inc. All rights reserved. 15

Discovery Protocol Hardening If protocol is only used for discovery and initial configuration, allow it to be disabled once device reaches configured state Disable support for unicast and filter broadcasts on router/switch If open protocols are used, you need to filter on message type (i.e. Modbus/TCP function codes) 2001, Cisco Systems, Inc. All rights reserved. 16

Embedded HTTP Servers The only thing worse than HTTP would be NetBIOS or DCOM HTTP Server Identification None Third Party-Toolkit Device Name and Version Authentication Options None HTTP Basic Authentication Form Variable (possibly Java/JavaScript) 2001, Cisco Systems, Inc. All rights reserved. 17

Embedded HTTP Servers (cont.) Information provided to an attacker (assuming no authentication) Device name, type Device process, memory, network information Configuration options Only one product had the ability to disable the web server--this should be mandatory 2001, Cisco Systems, Inc. All rights reserved. 18

Security Features Currently Available Service profiles to disable unnecessary (and potentially vulnerable) applications Simple application access control lists by IP address but not true packet filtering Secure terminal administration via SSH 2001, Cisco Systems, Inc. All rights reserved. 19

Overall Device Recommendations Allow services to be disabled For devices that have management interface (telnet, SSH, HTTP) add options to disable services based on customer requirements For those that don t, add this feature to the Windows configuration tool Add IP-based access controls to end devices Conduct basic robustness testing using known attack tools and techniques (i.e. ISIC and Nessus) 2001, Cisco Systems, Inc. All rights reserved. 20

Overall Network Recommendations Aggressively filter traffic to control systems networks and to Serial-Ethernet gateways Block UDP, broadcast/multicast, and high risk ports on perimeter routers and switches Use remote access VPN to provide granular authentication and authorization to remediate lack of security features on end devices Consider deployment of host based IDS for Microsoft platforms that cannot be updated Development of custom signatures for network IDS for automation protocols (??) 2001, Cisco Systems, Inc. All rights reserved. 21

Conclusions High risk that worm/scanning activity could impact communication with Ethernet-enabled industrial devices Management ports were relatively easy to kill Physical reboot often required to correct problem On modular IO devices the core functional (control loop) was usually unaffected Some vendors and implementations are doing the right thing, so minimum security behavior is possible no room for excuses 2001, Cisco Systems, Inc. All rights reserved. 22

Conclusions (cont.) In general, you get what you pay for both for quality and features Most issues were in applications (especially TCP) but complete crash (reboot and loss of IP connectivity) was less common that expected Non-compliant devices are harder to find using known scanning techniques, but that doesn t make them more secure Blind TCP sequence number attacks (to reset or hijack) should be possible given the weak ISN generation routines in most stacks 2001, Cisco Systems, Inc. All rights reserved. 23

Areas for further research & testing Develop more formal set of minimum requirements for robustness and security features in embedded industrial devices (SP-99 WG3?) Vulnerability analysis and testing embedded web servers and web applications (whether commercial toolkit or homegrown) Comprehensive security analysis and vulnerability testing (both design & implementation) of open automation protocols including system-wide impact of protocol attacks Learn from the mistakes of others while not all IT Security solutions apply, the vulnerability assessment 2001, Cisco Systems, Inc. All rights reserved. 24

References Pothamsetty & Balinsky, A Structured and Practical Methodology for Security Evaluation of an IP Stack http://www.cisco.com/security_services/ciag/documents/stac k-howto.pdf Trinux: A Linux Security Toolkit contains precompiled versions of popular security tools http://trinux.sourceforge.net Nessus http://www.nessus.org 2001, Cisco Systems, Inc. All rights reserved. 25

References (cont.) Presentation (and white paper, eventually) available at: http://www.scadasec.net/ http://www.io.com/~mdfranz/papers/ http://www.cisco.com/go/ciag/ 2001, Cisco Systems, Inc. All rights reserved. 26