The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) has called for businesses involved in critical infrastructure to be extra vigilant as it investigates a potential critical flaw in a commonly used SCADA system.
ICS-CERT issued the warning in a security advisory after security researcher Luigi Auriemma uncovered a vulnerability that left many of the world's SCADA systems at risk.
"ICS-CERT is aware of a public report of a buffer overflow vulnerability with proof-of-concept (PoC) exploit code affecting Ecava IntegraXor, a supervisory control and data acquisition/human-machine interface (SCADA/HMI) product," said the advisory.
"IntegraXor is currently used in several areas of process control in 38 countries with the largest installation based in the United Kingdom, United States, Australia, Poland, Canada, and Estonia. ICS-CERT recommends that users take defensive measures to minimise the risk of exploitation of these vulnerabilities."
Specifically the security team recommended that SCADA users "minimise network exposure for all control system devices and/or systems, and ensure that they are not accessible from the internet. Locate control system networks and devices behind firewalls, and isolate them from the business network."
Trend Micro security expert Rik Ferguson told V3 that the vulnerability listed in the advisory is particularly dangerous as it could theoretically be exploited by hackers to launch a variety of attacks, including denial of service.
"According to the researcher, and also to the proof of concept that he has released, this vulnerability results most often in a denial of service condition, which should be concerning enough in itself for the kinds of production environments in which Ecava IntegraXor operates," he said.
"However, Auriemma has also said that in certain conditions the vulnerability can lead to arbitrary execution of code, which could have far more serious ramifications, opening the door to further compromise."
ICS-CERT confirmed it has contacted Ecava, the company that makes the system, and is working to identify and fix the flaw.
Attacks on critical infrastructure systems have been a growing problem facing businesses and governments. The danger was showcased in 2011 when the notorious Stuxnet malware was discovered targeting Iranian nuclear plants.
The Stuxnet malware subsequently spread and has been discovered in numerous locations, including a Russian nuclear power plant. Security experts have since warned that it is only a matter of time before the Stuxnet malware hits the UK.
Ultra-high-end all-in-one PCs from HP feature either 24-inch or 27-inch displays
Roomba 'smart' vacuum cleaner company iRobot plans to sell maps of users' homes to Apple, Amazon and Google
'Smart' products spying on their owners and selling the data for profit? Who'd have thought it!
TNT Express still struggling with NotPetya malware - crucial documents remain locked up in borked systems as staff grapple with manual procedures
TNT depots over-flowing with parcels as the company struggles to recover from NotPetya - while Reckitt Benckiser reports 'ongoing' recovery
Full roll-out of Android O expected within weeks