Internet-exposed ICS devices running insecure Modbus leave critical infrastructure open to disruption

Administrator

Administrator
Staff member
Apr 20, 2025
2,298
449
83

Internet-exposed ICS devices running insecure Modbus leave critical infrastructure open to disruption

69d8f8f2676c5.jpg


Industrial Control Systems: A Breach Waiting to Happen

The world of technology isn't always safe. In fact, a recent study highlights a significant weakness in our critical infrastructure. The study found that 179 Industrial Control Systems (ICS) are exposed on the internet, creating a real risk for sectors like power grids, manufacturing, and transportation.

These devices, which communicate through port 502, have become a part of our everyday lives. They help in managing systems that are crucial to our society. But, this increased connectivity comes without proper security measures, leaving these devices vulnerable to disruption.

The Threat of Malware

Malware poses a serious threat to these systems. Variants like Industroyer, Stuxnet, Havex, Triton, and BlackEnergy have proven their potential to interfere with industrial processes, disrupt power supplies, and even cause physical damage to infrastructure. This is a significant concern, as any disruption to these systems can cause severe consequences for the industries they support.

Among the exposed systems, some are associated with a national railway network, while others are part of power grid infrastructure in Asia and Europe. Industrial Control Systems hold a critical role in these sectors, controlling and monitoring operations. If manipulated, they could potentially disrupt service delivery and physical processes, raising both operational and safety concerns.

The Root of the Problem

The core issue lies with the reliance on outdated protocols like Modbus, which lack encryption and authentication. This means that even a low-skilled attacker can easily access these devices. The research points out that these systems were designed for isolated environments, not for today's internet-connected architectures. This makes them particularly vulnerable when exposed directly to the internet. Without safeguards like firewalls or VPNs, these devices become easy targets, increasing both cyber and physical risks.

The highest number of exposed industrial control devices was found in the U.S., with 57 devices, followed by Sweden with 22, and Turkey with 19.

Real World Implications

These exposed devices include those that form part of a national railway network and power grid infrastructure. In the energy supply sector, ICS devices are used to monitor consumption and control electrical distribution. Therefore, the exposure of such devices could pose a serious safety and operational risk.

The majority of the exposed devices only revealed their firmware versions or internal IDs, without including a vendor string. This is typical of custom controllers or embedded modules. A total of 54 devices advertised their manufacturer, though not always their model information.

The exposed devices include a logic controller that automates industrial processes by monitoring inputs and controlling outputs. A logic controller designed to manage distributed input and output modules across large-scale industrial networks was also identified.

Other exposed systems include an energy meter and data logger, which measures electrical usage across multiple circuits, logs detailed data, and functions as a built-in web server. A processor module, which serves as the core of an industrial control system, was also found. This module reads inputs, executes logic, and drives outputs to control equipment.

Furthermore, a voltage and power logger was identified, enabling continuous monitoring and analysis of grid performance to detect disturbances early and maintain stable, reliable power across industrial systems and energy networks.

The Risks and Challenges

Revealing the make and model of a device can be dangerous. It allows attackers to find any associated register lists provided by the manufacturer. These lists map the values found in each device's holding registers to sensor readings, control states for switches, motors or pumps, target values for controllers, and error or status codes.

With the global industrial automation and control systems market currently valued at $226.76 billion and projected to grow to $504.38 billion by 2033, the number of connected industrial devices is rapidly increasing. This expansion presents a significant cybersecurity challenge: every newly networked device introduces potential attack surfaces that must be protected.

From an attacker’s perspective, devices running protocols like Modbus are particularly vulnerable because they were designed for closed networks and often lack built-in authentication or encryption. These devices could be exploited by attackers with limited technical expertise if exposed directly to the internet. This is particularly concerning given the critical role these ICS devices play in our economy and essential infrastructure.