


Microsoft warns of industrial control system security risks: loopholes may lead to devastating consequences
Recently, Microsoft network security experts issued an important security bulletin, revealing a series of high-risk vulnerabilities found in the development tools of programmable logic controllers (PLC). The potential harm of these vulnerabilities is huge and can be exploited by malicious attackers to cause serious damage or even cause the outage of critical infrastructure such as power plants.
Microsoft threat analyst Vladimir Tokarev discovered this issue in the CODESYS V3 SDK . CODESYS V3 SDK is widely used in the industrial field and has been used to develop millions of PLC controllers. The vulnerabilities are rated as high-risk vulnerabilities, with scores ranging from 7.5 to 10 out of 10, indicating their serious threat
According to reports, CVE-2022-47379 Tracking numbers have been identified for these vulnerabilities. Microsoft urges all developers using CODESYS to immediately upgrade to version 3.5.19.0 or higher to fix these vulnerabilities and ensure system security
In the face of the threat of these vulnerabilities, experts have made some suggestions to reduce the potential risk. Microsoft recommends isolating the SPS (Programmable Logic Controller) and its associated infrastructure from the Internet to reduce the possibility of potential attacks. In addition, to help engineers and administrators better discover vulnerable devices, Microsoft 365 Defender has also released a free software tool to enhance the overall security of the system
As industrial automation technology further advances With the development, the criticality of PLC controller has become more important. However, this also provides opportunities for malicious attackers to find and exploit vulnerabilities. It is understood that this incident reminds us that protecting the security of industrial control systems is crucial and requires joint efforts at the technical, policy and practical levels to ensure the stable and safe operation of critical infrastructure
The above is the detailed content of Microsoft warns of industrial control system security risks: loopholes may lead to devastating consequences. For more information, please follow other related articles on the PHP Chinese website!

This tutorial guides you through building a serverless image processing pipeline using AWS services. We'll create a Next.js frontend deployed on an ECS Fargate cluster, interacting with an API Gateway, Lambda functions, S3 buckets, and DynamoDB. Th

This pilot program, a collaboration between the CNCF (Cloud Native Computing Foundation), Ampere Computing, Equinix Metal, and Actuated, streamlines arm64 CI/CD for CNCF GitHub projects. The initiative addresses security concerns and performance lim

This Go-based network vulnerability scanner efficiently identifies potential security weaknesses. It leverages Go's concurrency features for speed and includes service detection and vulnerability matching. Let's explore its capabilities and ethical


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Atom editor mac version download
The most popular open source editor

SublimeText3 Linux new version
SublimeText3 Linux latest version

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

Zend Studio 13.0.1
Powerful PHP integrated development environment

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.