Security Flaw Disclosure Debate Boils Over to SCADA Industry
A security information firm says it found 23 flaws in critical infrastructure software and plans to reveal details to the companies involved, while criticizing a rival that refuses to do so.Calling the computerized systems designed to manage critical infrastructure "easy targets," a security researcher at startup Exodus Intelligence announced the firm had found 23 vulnerabilities in the software used to control utilities and energy systems. In a post Nov. 26, Exodus Intelligence Vice President of Research Aaron Portnoy said that a rival firm's claim to have found nearly a dozen flaws in the supervisory control and data acquisition (SCADA) systems of six industrial-control system manufacturers inspired him check out the software for himself. In one morning, Portnoy claims to have discovered issues in software from Rockwell Automation, Schneider Electric, Indusoft, RealFlex and Eaton Corp. "The most interesting thing about these bugs was how trivial they were to find," he wrote in the blog post. "For someone who has spent a lot of time auditing software used in the enterprise and consumer space, SCADA was absurdly simple in comparison. The most difficult part of finding SCADA vulnerabilities seems to be locating the software itself." Last week, vulnerability-finding firm ReVuln claimed to have found serious vulnerabilities in a number of SCADA software systems, including those made by General Electric, Schneider Electric, Kaskad, Rockwell Automation, Eaton and Siemens. The vulnerabilities ranged from a full compromise of the system to flaws that allow information-stealing attacks, according to a video posted online last week.