Users of IoT products from three major vendors at risk

At least nine vulnerabilities in the approach three leading IoT vendors used to implement the open platform communication (OPC) network protocol created conditions that could potentially expose product users to denial-of-service (DoS) attacks, remote code execution, and sensitive data leakage. The three IoT vendors – Softing Industrial Automation GmbH, Kepware PTC, and Matrikon Honeywell – all provided fixes for their respective products after security firm Claroty privately disclosed them during 2020. OPC functions as the middleman of operational technology (OT) networks, ensuring operability between industrial control systems (ICS) and proprietary devices, such as programmable logic controllers (PLCs) responsible for the correct operation of field devices. Standardized communication protocols such as OPC and its specifications guarantee that management and oversight of devices and processes can happen from a centralized server. The researchers urged vulnerable users to update immediately to the latest versions if the affected products.

The Industrial Control System Cyber Emergency Response Team (ICS-CERT) also has published advisories, warning users of the affected products about the risks and offering update and mitigation information. Claroty researchers cautioned the attack surfaces will expand and said organizations must examine their respective implementations for weaknesses. Meanwhile, the security community must also support enhanced security and research into undiscovered vulnerabilities and protocol shortcomings. Today’s report comes as a significant reminder that industrial control systems rely on software and these systems are open to abuse by cybercriminals, said Joseph Carson, chief security scientist and Advisory chief information security officer at Thycotic. “For OPC software this means it must be hardened and kept on segmented secure networks with strong privileged access security controls,” Carson said. “A defense-in-depth strategy for ICS is vital to protecting them against unauthorized access so that even when security vulnerabilities are exposed the risks on abusing them is very limited.”

The vulnerabilities discovered include the following:

Softing Industrial Automation GmbH

CVE-2020-14524: Heap-Based Buffer Overflow (CWE-122)

CVE-2020-14522: Uncontrolled Resource Consumption (CWE-400)

Kepware PTC

CVE-2020-27265: Stack-based buffer overflow (CWE-121)

CVE-2020-27263: Heap-based buffer overflow (CWE-122)

CVE-2020-27267: Use-after free (CWE-416)

Matrikon Honeywell OPC DA Tunneler

CVE-2020-27297: Heap overflow due to integrer overflow (CWE-122)

CVE-2020-27299: Information leak due to OOB read (CWE-125)

CVER-2020-27274: Improper check for unusual or exceptional conditions (CWE-754)

CVE-2020-27295: Uncontrolled resource consumption (CWE-400)

 

To stay up to date on the latest, trends, innovations, people news and company updates within the global security market please register to receive our newsletter here.

Media contact

Rebecca Morpeth Spayne,
Editor, Security Portfolio

Tel: +44 (0) 1622 823 922
Email: [email protected]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Mike Hurst - Security Buyer

Zygal appoints Mike Hurst CPP CPOI

Zygal, which produces cutting edge AI cloud VMS and monitoring solutions for connecting, managing, and monitoring assets…
Secure Logiq

Secure Logiq expands into APAC

Secure Logiq is heading into the Asia-Pacific region with big plans and a clear focus on Australia and New Zealand. Helping to steer…
Sophos

Sophos Enhances Protection and Incident Response

Sophos announces an update to its Sophos Firewall, now including Sophos NDR Essential, which is free for all customers with an…
Dallmeier

Tenerife Airport relies on video technology

Tenerife Norte-Ciudad de La Laguna Airporthas significantly improved its safety by installing state-of-the-art video technology..
ICT

ICT announces Stewart Meyer as Chief Marketing Officer

Integrated Control Technology (ICT®), a leading provider of intelligent access control, intrusion detection, building automation and…
IDIS

IDIS launches Edge AI Plus Camera Range

IDIS’s new Edge AI Plus Camera range gives users more flexible, affordable options to upgrade their video systems with advanced AI…
ASSA ABLOY Opening Solutions

Digitalising access and optimising workflows

Digitalization is high on the agenda, or well under-way, in all kinds of commercial environments. As part of this process…
Dallmeier

The new AI High Resolution Counting App from Dallmeier

The new Dallmeier AI High Resolution Counting App enables precise counting even with a large number of people and vehicles…
Environfence

Noise-reducing 12K Envirofence by Jacksons Fencing

Noise-reducing 12K Envirofence by Jacksons Fencing installed at Travis Perkins’ new Coventry depot – A case study
TDSi

TDSi Launches UK GARDiS Installer Training

Integrated Access Control and Security manufacturer TDSi announces that it is offering a free Training Kit to individuals taking part…
Scroll to Top