This blog is a follow-up to our first post on the 2023 Microsoft Digital Defense Report where I described our collaboration with Microsoft on identified exploitable OT vulnerabilities.
There is a saying in the IT world: patch early, patch often. It refers to the best practice of ensuring software is always running the latest version with the least number of bugs and vulnerabilities.
It’s good advice in the IT world, but for OT it is often impossible. PLCs cannot just be turned off and patched when tons of logs are racing through a sawmill, dependent on those PLCs safely guiding their journey. Nor can the PLCs controlling the painting process be stopped while an automobile assembly line is still running. They’re not like executive laptops that can be rebooted at midnight when they need the latest Windows update.
The need to ensure that an update will have no accidental impact on safety or production inevitably delays patching. Most guidelines for OT patch management suggest that companies push down patches to machines on a priority basis. This takes time: the pharmaceutical company AstraZeneca estimated back in 2006 that safe patching of OT systems requires 34 working days from when the patch is first released to when the most mission-critical OT device is patched.
Is that Patch Safety-Certified?
Another consideration that can limit timely updates are certifications. For example, a SIL Safety Certification is often required in situations where a PLC is controlling a hazardous process. Obtaining certifications is expensive so equipment manufacturers often don’t pursue certifications for every firmware version. Asset owners may thus need to skip some patches until the next certified version is available.
In reality, the patch cycle for OT devices can be years long for processes where high availability is critical. The costs involved in stopping are significant, so typically these patches are scheduled on an annual or biannual basis as part of a normal maintenance cycle.
Or at least they should be.
That Excuse Expired
What we discovered while digging into the distribution of firmware versions across Microsoft customers’ PLCs shocked me. Across various models of PLCs, 60% were running ancient firmware versions with 8 or more exploitable CVEs. And even more astonishing, updates have been available for over 10 years!
Yes, there are more patching constraints in OT than in IT. But that excuse eventually expires.
The Risk of Exploitable Vulnerabilities
Old firmware invariably means more CVEs, and the data bears that out. For example, firmware versions prior to 2012 had roughly 11 CVEs. But in 2012 a new version was released reducing the number of CVEs to around 2. Clearly the manufacturer invested the time and energy to eliminate vulnerabilities and improve the quality of their product. But that significantly lower-risk firmware was often never installed by the asset owners, even though it has been available since we all started dancing Gangnam Style.
Running firmware with 11 exploitable vulnerabilities introduces an unacceptable (and unnecessary) degree of risk. Yes, many old PLCs use inherently weak communications protocols (as Dale Peterson says, “Insecure By Design” protocols), but that has improved significantly over the past decade. Now most PLCs offer a secure communication option, but that is available only if you install the current firmware version.
The Reasons for Delinquent Patch Management
So why are control engineers not updating their firmware? It seems to be more of a people problem than a technical problem given the availability of the patches. I think these are the most likely culprits:
- An “if it ain't broke, don’t fix it” philosophy
- Lack of awareness
- Procrastination
The Low-Hanging Fruit
The upside to our findings is that many asset owners can realize a significant reduction in risk by patching their devices.
Through our research with Microsoft, we determined that if operators updated their firmware to the latest version, the number of devices free of exploitable CVEs would increase from 4% to 40%. This is a significant improvement, but there’s still plenty of risk in the remaining vulnerable devices. To quote the sage philosopher Jon Bon Jovi, “Whoa, we're halfway there, Whoa oh, livin' on a prayer.”
Here’s another way to look at the impact of updating those PLCs to the latest version: asset owners could reduce the percentage of the devices with more than 8 exploitable CVEs down to only 18%. Again, that’s still a lot of vulnerable PLCs on the OT network, but the goal should be improvement rather than perfection.
If, for whatever reason, OT asset owners choose to remain using ancient firmware, they can at least look at hardening configuration settings or using compensating controls (I wrote about this a decade ago - check out Solving the ICS Security Patch Problem). Of course, perhaps the owners of those unpatched PLC had applied compensating controls to protect their systems from all those vulnerabilities, but I doubt it. In most cases deploying and maintaining compensating controls takes far more effort than installing patches.
The research we did with Microsoft shows that far too many asset owners have leaned into the “we can’t patch this OT asset” excuse for far too long.
Microsoft’s key takeaway from the research was that having visibility into OT assets, patch levels, vulnerabilities, and availability of updates is an important part of a comprehensive OT risk management program.
Eric Byres
Eric is widely recognized as one of the world’s leading experts in the field of OT, IT and IoT software supply chain security. He is the inventor of the Tofino Security technology – the most widely deployed OT-specific firewall in the world. When not setting the product vision, or speaking at a conference, Eric can be found cranking away on his gravel bike.
Stay up to date
Browse Posts
- May 2024
- February 2024
- December 2023
- October 2023
- April 2023
- March 2023
- February 2023
- October 2022
- April 2022
- February 2022
- December 2021
- November 2021
- August 2021
- July 2021
- June 2021
- May 2021
- February 2021
- January 2021
- December 2020
- September 2020
- August 2020
- July 2020
- May 2020
- April 2020
- January 2020
- October 2019
- September 2019
- November 2018
- September 2018
- May 2018
Browse by topics
- Supply Chain Management (16)
- SBOM (15)
- Vulnerability Tracking (15)
- #supplychainsecurity (10)
- Regulatory Requirements (10)
- VEX (8)
- EO14028 (6)
- ICS/IoT Upgrade Management (6)
- malware (6)
- ICS (5)
- vulnerability disclosure (5)
- 3rd Party Components (4)
- Partnership (4)
- Press-release (4)
- #S4 (3)
- Software Validation (3)
- hacking (3)
- industrial control system (3)
- Code Signing (2)
- Legislation (2)
- chain of trust (2)
- #nvbc2020 (1)
- DoD CMMC (1)
- Dragonfly (1)
- Havex (1)
- Log4Shell (1)
- Log4j (1)
- Trojan (1)
- USB (1)
- Uncategorized (1)
- energy (1)
- medical (1)
- password strength (1)
- pharmaceutical (1)
Post a comment