Debug7: Leveraging a Firmware Modification Attack for Remote Debugging of Siemens S7 PLCs

  Рет қаралды 1,421

Black Hat

Black Hat

Күн бұрын

Industry 4.0 and smart manufacturing led to the emergence of a new type of PLCs, called software PLCs. In our previous work, sOfT7, presented in Black Hat USA 2022, we found that Siemens' leading software PLC, ET 200SP, utilizes a hypervisor that controls two virtual machines:
1) Windows Embedded, that communicates with the upper Purdue Model layers.
2) An encrypted Adonis Linux (SWCPU), that runs the programmable control logic and operates the
field devices.
In sOfT7 we presented a method that decrypts the SWCPU. A tool that implements sOfT7 was published in recent research from Black Hat Europe 2023. Our current research shows that a remote attacker who gains control over the Windows VM can perform a runtime modification of the software PLC (SWCPU) and use it for remote debugging of the S7-1500 firmware.
Despite being a major focal point for attackers and researchers, until now, there is no known method to perform dynamic runtime analysis of the SWCPU. Our research brings to light a novel method for debugging various firmware versions of Siemens S7 PLCs. Our analysis exposed a forgotten debug flag, that allows an attacker to replace the encrypted SWCPU with an arbitrary ELF file. We exploited this vulnerability and modified the firmware by hooking various system calls and latching onto an existing HTTP session exposed by Siemens' proprietary web server. This allowed us to communicate with the SWCPU and control it remotely. Using this communication channel, we developed a novel debugger, which can set breakpoints in the SWCPU during runtime and read/write the content of memory and registers. Due to the lack of a secure boot, we were able to persist the debugger's installation.
The debugger we built has a tremendous impact on the future research of the whole Siemens S7 PLCs product line, as the firmware we analyzed is shared across many of them. Additionally, any remote attacker that controls the Windows VM can replace the SWCPU and use the communication channel that we implemented to establish a connection with a malicious C&C server and control the PLC.
By:
Eyal Semel | Faculty of Computer Science, Technion, Israel Institute of Technology
Ron Semel | B.Sc. Student, Technion, Israel Institute of Technology
Alon Dankner | Security Researcher, Technion, Israel Institute of Technology
Sara Bitan | Dr., Technion & CyCloak, Israel Institute of Technology
Eli Biham | Prof., Technion, Israel Institute of Technology
Full Abstract & Presentation Materials:
www.blackhat.c...

Пікірлер
When u fight over the armrest
00:41
Adam W
Рет қаралды 23 МЛН
When mom gets home, but you're in rollerblades.
00:40
Daniel LaBelle
Рет қаралды 141 МЛН
True Ending of Black Myth: Wukong (with classical BGM)
5:49
FreeSide
Рет қаралды 975 М.
A Software Defined Radio (SDR) Approach to Radar
10:43
QIQ Systems
Рет қаралды 84 М.
Privacy Detective: Sniffing Out Your Data Leaks for Android
30:04
Reverse Engineering - GDB (GNU Debugger)
1:09:04
IronByte
Рет қаралды 12 М.
eBPF: Unlocking the Kernel [OFFICIAL DOCUMENTARY]
30:00
Speakeasy Productions
Рет қаралды 103 М.
How Linux Kernel Runs Executables
16:46
Nir Lichtman
Рет қаралды 29 М.
CppArm Meetup #10: Linux on GPU
1:04:22
CppArm Talks
Рет қаралды 188
Debugging Like A Pro
5:48
ByteByteGo
Рет қаралды 113 М.
When u fight over the armrest
00:41
Adam W
Рет қаралды 23 МЛН