CISA Advisory Illustrates Why OPSWAT & Bayshore Networks Are a Dynamic Duo

When it comes to critical infrastructure protection, is there a better match than industrial control systems (ICS) and operational technology (OT)? Not until recently, when OPSWAT acquired Bayshore Networks to further extend its critical infrastructure protection into ICS and OT environments.

As OPSWAT integrates with Bayshore Networks, the synergy between these two companies is extraordinary. Each team and its technology represents a dynamic partnership. When you bring together two industry-leading organizations like OPSWAT and Bayshore Networks, the people are just as important as the product.

Case in point, Bayshore Networks recently demonstrated their expertise with critical infrastructure protection when it identified a vulnerability with a programmable logic controller (PLC), the Rockwell Automation MicroLogix 1100. The Cybersecurity and Infrastructure Security Agency (CISA) published an ICS advisory about the Rockwell Automation MicroLogix 1100 vulnerability, which credits Bayshore Networks for its research.

This vulnerability could enable an unauthorized remote attacker to cause a denial of service by preventing its RUN mode. Bayshore Networks spoke with Security Week about the vulnerability, which could easily impact as many as 230 vulnerable PLCs (although it is possible that some of them could be honeypots).

In this short video below, you’ll watch a demonstration of the vulnerability and an example of how OPSWAT Client (when installed on the engineering station associated with MicroLogix 11 controller) will detect and alert the vulnerability.

Unfortunately, Rockwell has not been forthcoming with a patch (and may possibly never release one) since the MicroLogix 1100 has been discontinued. Instead, Rockwell is recommending that its customers leave its PLC in RUN mode or upgrade to its Micro870 controller. Another option is to maintain a backup copy of the project, which can be used to recover from this particular denial of service attack.

When it comes to ICS and OT, the mentality to stop supporting legacy systems is not unique, which is one reason that critical infrastructure protection can be so challenging. But even when a system can be upgraded, patched, or otherwise maintained, organizations may still struggle with security on air-gapped networks. That is one reason cross domain solutions such as the OPSWAT MetaDefender L1001 Kiosk, MetaDefender USB Firewall, MetaDefender Drive, MetaDefender Vault, OPSWAT Client and Central Management cover a comprehensive suite of solutions tailored for critical infrastructure protection.

The marriage of technology between OPSWAT and Bayshore Networks will enable us to deliver even more robust solutions to the market, but it is our people that will make it possible. This CISA advisory illustrates how much OPSWAT and Bayshore Networks have their finger on the pulse of ICS and OT environments.

Contact us today to speak with one of our experts about your critical infrastructure protection and how installing OPSWAT cross domain solutions can minimize your risk to vulnerabilities.

Sign up for Blog updates
Get information and insight from the leaders in advanced threat prevention.