SPRACO8 October   2019 AM3351 , AM3352 , AM3354 , AM3356 , AM3357 , AM3358 , AM3358-EP , AM3359 , AM4372 , AM4376 , AM4377 , AM4378 , AM4379 , AM5746 , AM5748 , AM5749 , AM6546 , AM6548

 

  1.   Programmable Logic Controllers — Security Threats and Solutions
    1.     Trademarks
    2. 1 Introduction
    3. 2 Reinventing the PLC for Industry 4.0
    4. 3 Security implications
      1. 3.1 Threat descriptions and risk assessment
    5. 4 TI security frameworks
    6. 5 TI devices with security enablers
    7. 6 Conclusion
    8. 7 References

Threat descriptions and risk assessment

Given the critical role that PLCs play in digital factories, Table 1 shows the potential attacks that can leave factories vulnerable. The threat scores listed in the third column leverage the first.org Common Vulnerability Scoring System Version 3.0 Calculator [2]. The higher the score, the greater the security risk, indicating the need to take proactive steps to enable countermeasures.

Table 1. Typical security threats for PLCs (1)

Threat Threat Description Threat Score CVSS
Denial-of-service attacks Bringing the system or PLC network down through malicious attacks; overloading the data stream to overload the memory, for example 8.6 CVSS Calculation – 8.6
Spoofing Intercepting communication to the host from the PLC and modifying it maliciously 8.5 CVSS Calculation – 8.5
Man-in-the-middle attacks A rogue PLC or remote input/output (I/O) intercepts and modifies/changes messages from a valid source, and forwards attack messages to a targeted PLC in an attempt to take down the PLC or have it respond in unintended way, like shutting down a section of a factory 8.5 CVSS Calculation – 8.5
Rogue PLC joining network A rogue PLC impersonating a legitimate PLC joins a factory network to create attack scenarios 8.5 CVSS Calculation – 8.5
PLC takeover Changing the PLC program or boot image to alter intended operations and create attack scenarios or denial-of-service attacks 7.4 CVSS Calculation – 7.4
Remote device management serves exploits Using remote device management services such as web managers, Telnet or Secure Shell running over a PLC for debugging or status reporting to gain control of a PLC or change its configuration 7.4 CVSS Calculation – 7.4
  1. Inputs used in the CVSS 3.0 calculator are based on TI’s assessment. You should review the threats and adjust based on your system design.