Siemens, Hitachi & Other Manufacturers Published Relevant Security Advisories
The following manufacturers with newly-published security advisories are listed by the CISA:
The Danger of Remote OT Attacks
on OT Infrastructure
Over half of the reported vulnerabilities can be exploited both with little effort (‘low attack complexity’) and by remote attackers (‘exploitable remotely’). Critical infrastructures are particularly at risk from this type of vulnerability: The attacker does not need to have any special expertise and does not need to be in the vicinity of the attack target. If the OT network is accessible from the internet , the attacker can be anywhere in the world. These attacks are also easy to automate, which further reduces the effort required by attackers.
According to the OMICRON OT Vulnerability Report 2024, over three quarters of all vulnerabilities can be accessed via the OT network. In order to minimise the threat posed by vulnerabilities, there are numerous measures that are state of the art, especially in critical infrastructures. In addition to obvious measures such as network segmentation and OT firewalls, precise vulnerability management and network monitoring, including anomaly detection, are standard OT security measures.
If, as in many OT networks, it is not possible to patch vulnerabilities (promptly), alternative protective measures must be taken. Attack detection systems that can specifically recognise and signal attack patterns in OT networks can be used for this purpose.