Unveiling the Risks of Exposed T5 PLCs, Vulnerable Routers, and RTSP Misconfigurations
Sulaiman Alhasawi
Founder of ICSrank and ICS Arabia Podcast ??? | ICS/OT Cybersecurity
Welcome to the 21st installment of “OT Hunt” where we dive into the challenges and opportunities within the realm of ICS/OT devices connected to the internet. This series aims to raise awareness among asset owners and ICS vendors, encouraging them to proactively secure their infrastructures.
The Discovery: T5 PLCs on the Internet
One day, I was exploring ZoomEye using the query device:"plc", searching for new PLC brands or types. To my surprise, a more refined search with the filter device:"plc" +app:"T5" revealed almost 2,500 online T5 PLC devices. These were predominantly located in Italy, with smaller distributions across other countries.
This discovery piqued my curiosity. What exactly is the T5 PLC? After some digging, I found that it originates from a French vendor, COPALP (now COPA-DATA France), which specializes in industrial products like historian and PLCs. Learn more about them at COPA-DATA.
Observations on Security: The Weak Links
Unfortunately, my findings revealed significant security lapses, particularly in China, where many T5 PLCs were exposed with weak configurations. Here’s what stood out:
1. Open FTP Ports with Anonymous Login
2. Open Telnet Ports
3. Vulnerable Cermate Routers
4. RTSP Ports (554) Exposed
The Risks of Exposed RTSP Ports:
Testing RTSP Configurations: Tools and Techniques
If you're dealing with RTSP exposure, testing its configuration can help identify vulnerabilities. Here are some tools and methods to try:
领英推荐
1. curl Command
curl -i -X DESCRIBE rtsp://10.10.14.30/Streaming/Channels/101
2. nmap with RTSP Scripts
nmap -sV --script "rtsp-*" -p 554 10.10.14.30
3. Hydra Brute Force
hydra -s 554 -l admin -P /path/to/wordlist.txt rtsp://10.10.14.30
4. VLC for Stream Viewing
vlc rtsp://10.10.14.30/live
Summary: The Cost of Exposure
When industrial devices like PLCs are exposed to the internet, the risks are high. My research found that many T5 PLCs also had open Modbus ports (502), which attackers could exploit using open-source tools to pull data. Combining this with vulnerable services like FTP, Telnet, and RTSP creates multiple entry points for attackers.
The critical question is: Who knows what's behind these exposed devices?
Conclusion: Stay Vigilant
This article highlights critical security vulnerabilities in T5 Programmable Logic Controllers (PLCs) and routers utilizing the Real-Time Streaming Protocol (RTSP).These weaknesses can be exploited by cyber criminals to disrupt industrial control systems, leading to potential operational failures and safety hazards. The article underscores the importance of implementing robust security measures, such as regular firmware updates, network segmentation, and stringent access controls, to safeguard these systems against cyber threats.
ICSRank is here to help you discover, assess, and secure your ICS/OT systems. Stay tuned for more insights in future OT Hunt installments. Together, we can defend critical infrastructure against evolving cyber threats.
Let’s make security a priority. Your vigilance matter
CyberSecurity Expert,IBM Qradar, LogRythm Siem,DarkTrace Threat Visualizer 6.0, DarkTrace Detection Response,DarkTrace Email Security, IBM Cyber Threat Intelligence, Splunk Siem, OT Security,EDR, XDR, SOC Analyst Level 2
2 个月Mitigation Strategies: Update Firmware Regularly: Ensure that both the PLC and router firmware are updated regularly to patch known vulnerabilities. Disable Unused Services: Disable open ports, including RTSP ports, when they are not necessary. Use a firewall to restrict access to critical services to trusted IPs only. Use Strong Authentication and Encryption: Enable strong password policies and consider using encryption for any sensitive data, including video feeds transmitted over RTSP. Network Segmentation: Place critical devices like PLCs and cameras on separate networks to isolate them from the rest of the infrastructure, limiting exposure to attacks. Monitor for Unusual Traffic: Regularly monitor network traffic for unusual behavior that may indicate attempts to exploit vulnerabilities or unauthorized access. By understanding and addressing the vulnerabilities associated with T5 PLCs, routers, and RTSP ports, organizations can significantly reduce the risk of security breaches and system compromises. Hardening is best
OT Security Engineer@ Siemens,|xEmersonAutosol Noida|
3 个月Great insight, Hardening is important to secure an OT device...
Senior OT/ICS/IT & Cybersecurity Consultant
3 个月Interesting