Researcher Publishes Attack Code for 35 SCADA Vulnerabilities

Kara Reeder

According to InformationWeek, security researcher Luigi Auriemma has released detailed proof-of-concept attacks for 35 vulnerabilities in supervisory control and data acquisition systems (SCADA).


CRN reports that the flaws impact Siemens Tecnomatix FactoryLink, Iconics GENESIS32 9.21 and GENESIS64 10.51, 7-Technologies IGSS and DATAC RealWin 2.1 (Build from DATAC.


While many of the vulnerabilities pose little danger other than a system crash, there are two notable exceptions: Siemens Tecnomatix FactoryLink can be made to download a file, creating the possibility of a remote code execution attack. In addition, 7-Technologies IGSS software is at risk of arbitrary file execution.


PCWorld reports that the findings prompted U.S. CERT's Industrial Control Systems Cyber Emergency Response Team to issue four alerts. But Auriemma downplays the risk:

In my opinion there is absolutely no risk because these systems are not made to be reached via the internet ... If an attacker reaches the vulnerable systems, it means the security of the company has been already compromised before.

Siemens is no stranger to SCADA vulnerabilities. Its WinCC product was targeted by the Stuxnet malware, which is widely believed to have been developed by a government. It is thought to have been created to disrupt uranium enrichment efforts.

Add Comment      Leave a comment on this blog post

Post a comment





(Maximum characters: 1200). You have 1200 characters left.



Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making


SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data