Kaspersky has released its ICS Vulnerabilities Database, offering a new threat intelligence service for industrial organisations. The service will provide customers with access to a constantly updated database containing information on vulnerabilities in industrial control systems (ICS) and industrial IoT (IIoT) products, along with rules and algorithms to detect possible attacks. With this service, asset owners will be able to perform vulnerability assessments and patch management, and ensure they are protected from possible targeted attacks.
As in any computing system, vulnerabilities in industrial components are inevitable. Each year, Kaspersky Industrial Control Systems Cyber Emergency Response Team (Kaspersky ICS CERT) finds no less than 60 new vulnerabilities in IIoT components and industrial control systems, potentially affecting hundreds and thousands of ICS or IIoT products. These can lead to system failure or give malware access to the product’s management and critical manufacturing data. For customers, it is important to be aware of these vulnerabilities, understand how critical they are and learn what can be done to patch or mitigate them.
In addition to being aware the vulnerabilities in a product they may be using on their ICS networks, industrial organisations need to have the ability to detect and prevent possible attacks that can occur if any of these vulnerabilities are exploited. The difficulty is that intrusion detection systems commonly have attack detection signatures and rules focusing primarily on IT asset protection. This can mean that network attack vectors that could specifically target vulnerable ICS components may not be uncovered.
The Kaspersky ICS Vulnerability Database will include continually updated information about the most critical vulnerabilities contained in widely-used ICS products from a variety of vendors. Each record will contain detailed technical information for industrial organisations to check whether their assets are vulnerable. Users can then prioritise and plan vulnerable system updates or other actions to mitigate the risks of possible exploitation by a malicious actor.
The information is delivered in a directly readable and machine-readable format via REST API, so customers can integrate it into their existing cybersecurity tools and decide on the remediation actions needed.
The second component of this Kaspersky service – the Network Attacks Signatures Database — provides signatures of ICS threats. It can be integrated with third party intrusion detection systems to help customers minimise the risk of cybersecurity incidents in their industrial infrastructure.
Georgy Shebuldaev, Head of Kaspersky Industrial Cybersecurity Business Development, says, “With this new service we aim to help customers enhance their vulnerability management and incident detection with Kaspersky expertise. Penetration testing and periodic vulnerability assessments of an industrial enterprise can provide a good picture of its current cybersecurity state and motivate operation technology (OT) or security teams to make improvements.
“Continuously assessing vulnerability is one of the most important aspects of planning remediation to reduce the possible attack surface. This can typically be implemented only in a passive way, due to the nature of the related environments. Publicly available ICS or IIoT vulnerability information sources generally lack much of the required information, consistency and clarity to be useful for effective continuous vulnerability assessments. I believe that the ready-to-use intelligence and guidance that the ICS Vulnerabilities Database provides will solve this problem.”
For more information contact Kaspersky at firstname.lastname@example.org
Or visit the website: www.kaspersky.co.za