Security researchers have reported 147 vulnerabilities in 34 mobile applications used in conjunction with Supervisory Control and Data Acquisition (SCADA) systems. These vulnerabilities could enable a hacker to compromise industrial network infrastructure by allowing them to disrupt an industrial process or cause a SCADA operator to unintentionally perform a harmful action on the system. IT security experts commented below.
John Kozyrakis, Applied Research Lead at Synopsys:
The alarming part is that the presence of such simple to find vulnerabilities indicates an almost complete disregard for security best practices by the software developers. All these issues could have been mitigated if some form of security testing or code review had been performed on the applications prior to their release.
SCADA organisations, and their application vendors, should strive hold their applications to a higher standard and implement a robust secure software development lifecycle which includes secure design, code auditing and security testing of the applications.”
Andrea Carcano, Co-Founder and Chief Product Officer at Nozomi Networks:
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.