Talk With an Expert

Vulnerabilities on the Wire: Mitigations for Insecure ICS Device Communication

Vulnerabilities on the Wire: Mitigations for Insecure ICS Device Communication (PDF, 3.55MB)Published: 12 Feb, 2020
Created by:
Michael Hoffman
Michael Hoffman

Modbus TCP and other legacy ICS protocols ported over from serial communications are still widely used in many ICS verticals. Due to extended operational ICS component life, these protocols will be used for many years to come. Insecure ICS protocols allow attackers to potentially manipulate PLC code and logic values that could lead to disrupted critical system operations. These protocols are susceptible to replay attacks and unauthenticated command execution (Bodungen, Singer, Shbeeb, Hilt, & Wilhoit, 2017). This paper examines the viability of deploying PLC configuration modifications, programming best practices, and network security controls to demonstrate that it is possible to increase the difficulty for attackers to maliciously abuse ICS devices and mitigate the effects of attacks based on insecure ICS protocols. Student kits provided in SANS ICS515 and ICS612 courses form the backdrop for testing and evaluation of ICS protocols and device configurations.

Meet the expert

Michael Hoffman
Michael Hoffman

Michael Hoffman

Certified Instructor

Mike is a SANS Technology Institute graduate, earning his master’s degree in information security engineering with an Industrial Control Systems focus. Besides his work at Dragos, Inc. he teaches ICS612: ICS Cybersecurity In-Depth at SANS.

Read more about Michael Hoffman