Microsoft found a security bug so powerful that it could shut down a power plant
Specifically, the vulnerability affects the CODESYS V3 software development kit (SDK) that is used to program logic controllers, devices that open and close valves, rotate motors, and control many physical devices. inside industrial facilities worldwide such as power generation plants, energy automation, and process automation.
The SDK allows developers to be compatible with IEC 611131-3, a safe programming language system for use in industrial environments.
According to a Microsoft report, if a hacker performed a DOS attack on a device using a vulnerable version of CODESYS, it could shut down a power plant, interfere with its operations, and cause the systems to fail. Control logic runs abnormally, or steals important information.
Many vendors around the world are using CODESYS, so a single vulnerability can affect multiple sectors, device types, and verticals. The 15 vulnerabilities discovered by Microsoft can all lead to DoS and RCE attacks. Although exploiting these vulnerabilities requires deep knowledge of CODESYS V3's proprietary protocol as well as user authentication, a successful attack has the potential to cause massive damage to target users. pepper.
Since September 2022, Microsoft has privately reported the vulnerabilities to the CODESYS developer unit and has released patches. Many vendors using the SDK now have the updates installed.
You should read it
- 'Printer Catastrophe' Vulnerability Threatens All Versions of Windows
- Log4Shell zero-day vulnerability discovered, the new nightmare of enterprises
- The NSA issued an urgent warning about a critical vulnerability appearing in Windows servers
- New privilege escalation vulnerability called 'Dirty Pipe' is threatening all Linux distros
- This critical vulnerability turns home devices into attack tools
- Detected Critical Security Bugs Affecting All Versions of Windows
- Vulnerability in WinRAR puts users at risk of being attacked
- NVIDIA Jetson chipset contains a series of security holes that allow data theft, DDoS attacks
May be interested
- How to Shut Down Windowsthis wikihow teaches you the safest way to shut down any version of windows. there are many ways to shut your pc down safely, but the most common way to do so is using the shut down option in your start menu. to avoid data loss, make sure...
- Why must India implement security systems for the power sector?recently, the indian power business association has come to an agreement that it will deploy a comprehensive firewall system, combined with many other security measures.
- Compare Microsoft Excel and Power BIexcel and power bi are two very popular tools. both offer a range of visualization and analysis tools to help you create dashboards and reports.
- How to customize the Power button function on PC, laptopthe power button can be customized to perform different functions such as sleep, hibernate or shut down. understanding and adjusting accordingly gives you more control over your device's performance.
- Microsoft Power Automate is officially launched to usersmicrosoft power automate is the replacement service for microsoft flow. with process avisor, you can simplify your workflow when addressing bottlenecks by exploiting processes in power automate.
- How to combine multiple data sets in Microsoft Excel with Power Querymicrosoft power query is a useful tool for working with data inside microsoft excel. it comes with lots of features that help manage simple but powerful datasets.
- Top 3 tools to manage and control Shut down on Windowsshut down is one of the basic functions of a computer, but you can use third-party tools to better control it. in this article, tipsmake.com will introduce you to some tools to block, automate and speed up the shutdown process. all of the programs below are provided free and extremely compact and do not take up much of your system resources.
- Will disaster happen when the leaves in Chernobyl area do not decompose?the explosion of the chernobyl nuclear power plant has passed 30 years, but the consequences of the explosion left are still worrisome for people. one of the environmental problems warned by scientists since 1992 is that the leaves in chernobyl area are not biodegradable. this may soon become a disaster because of the drier summers due to the effects of climate change.
- Set the shutdown or hibernate time for the computerfor many computer users, i am very interested and want to know how to turn off the computer (shutdown) or hibernate (hibernate) at a set time. the easiest way to do this is to set the open application windows to close automatically and the computer will shut-down or switch to hibernate mode after a specified time through power settings. option.
- Many serious security holes are found in GitLabin the last week, gitlab has released a variety of unusual updates to thoroughly address some of the key security holes found on the platform.