SCADA servers remained vulnerable to attacks months after patches were released.
Dozens of internet-exposed ICONICS Suite SCADA servers remained vulnerable to attacks months after patches were released.
According to researchers from Palo Alto Networks, five high-severity flaws were exploited. A pair of vulnerabilities, tracked as CVE-2024-7587 and CVE-2024-1182, stemmed from ICONICS utilisation of outdated tools and components for industrial control system interoperability.
The other three security issues, tracked as CVE-2024-8299, CVE-2024-8300, and CVE-2024-9852, affect the latest iterations of its tools and could be leveraged to facilitate phantom DLL hijacking and lateral movement while circumventing endpoint detection and response systems, CyberScoop reported.
"On unpatched ICONICS installations without any workarounds or remediations, these vulnerabilities could lead to escalation of privileges, [denial of service] and in specific circumstances, even full system compromise," said Unit 42 researchers.
Written by
Dan Raywood is a B2B journalist with 25 years of experience, including covering cybersecurity for the past 17 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.
He has spoken at events including 44CON, Infosecurity Europe, RANT Forum, BSides Scotland, Steelcon and the National Cyber Security Show, and served as editor of SC Media UK, Infosecurity Magazine and IT Security Guru. He was also an analyst with 451 Research and a product marketing lead at Tenable.