Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

ICS Vendors Respond to Log4j Vulnerabilities

ICS vendor responses to Log4j vulnerabilities

ICS vendor responses to Log4j vulnerabilities

SecurityWeek has compiled a list of the advisories published by industrial control system (ICS) and other industrial-related vendors in response to the recent Log4j vulnerabilities.

Several vulnerabilities have been discovered in the Log4j logging utility since early December, but the most important of them is CVE-2021-44228, which has been dubbed Log4Shell. Log4Shell has been exploited in many attacks by cybercriminals and state-sponsored threat actors, including against industrial organizations.

Major companies that provide industrial services and solutions have released advisories to inform customers about the impact of the Log4j vulnerabilities. This article presents the information that is currently available from vendors, but their advisories may be updated with additional impacted products or versions.

ABB

ABB says it’s still investigating the impact of the Log4j vulnerabilities on its products. To date, it has confirmed that its B&R products and ABB Remote Access Platform (RAP) are affected. A fix has already been delivered for RAP. In the case of B&R, products are affected by a less severe flaw (CVE-2021-4104) and exploitation is not possible in the default configuration.

Emerson

Emerson has published an advisory listing many products that are not impacted by the security holes, but the company said its notification will be updated if new information emerges.

Honeywell

Advertisement. Scroll to continue reading.

Honeywell claims that only some of its Voice applications are impacted. The company’s public advisory does not contain any details and instead points customers to its tech support portal for information on specific updates.

Johnson Controls

Johnson Controls is still investigating and, to date, it has only shared a list of products that are not affected.

Moxa

Moxa is also investigating and to date it hasn’t identified any products that are affected. The firm has released a list of products that it has confirmed are not impacted.

Phoenix Contact

Phoenix Contact says only its cloud services are affected by Log4Shell, but only “partly” and remediations are being implemented. The company has determined that its physical and software products are not impacted.

Rockwell Automation

Rockwell Automation has completed its investigation and found that the Log4j flaws impact Plex IIoT, Fiix CMMS, Warehouse Management, EIG, Industrial Data Center, VersaVirtual Application, FactoryTalk Analytics and Firewall Managed Support. The company has provided patches and mitigations, but EIG has been discontinued and no fixes are available.

Schneider Electric

Schneider Electric has already patched the vulnerabilities in EcoStruxure IT Gateway and over a dozen of its cloud-based products. Many of the fixes developed by the company are deployed automatically and customers do not need to take any action. The industrial giant is also working on fixes for APC PowerChute, Building Advisor StarDog, and Eurotherm Data Reviewer. In the meantime, mitigations are available.

Siemens

Siemens is still investigating, but it has already confirmed that many of its products are impacted by Log4Shell and the other Log4j vulnerabilities. The industrial giant’s advisory lists over 100 affected products. The company has provided patches and mitigations.

Sierra Wireless

Sierra Wireless has completed its review to determine the impact of the Log4j bugs and found that Log4Shell and CVE-2021-45046 do affect its AM/AMM servers and certain internal components of the AirVantage and Octave cloud platforms — although CVE-2021-45046 cannot be exploited due to the specific configuration requirements. The company is providing patches for on-premises servers.

WAGO

WAGO says Log4j has only been found in its Smart Script labeling software, starting with version 4.2. A patch is included in version 4.8.1.4, which is already available.

Several ICS companies have informed customers that their products are not impacted, including Inductive Automation, VTScada, and COPA-DATA.

Related: ICS Vendors Address Vulnerabilities Affecting Widely Used Licensing Product

Related: ICS Vendors Assess Impact of INFRA:HALT Vulnerabilities

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders.

Register

People on the Move

Managed security platform Deepwatch has named John DiLullo as Chief Executive Officer.

Technology company Tools for Humanity (TFH) hires Damien Kieran as CPO and Adrian Ludwig as CISO.

AI driven XDR provider Vectra AI has appointed Sailesh Munagala as Chief Financial Officer.

More People On The Move

Expert Insights