如何即時固守 OT 工業控制的 最後一道資安防線 Seize the last chance of preventing OT Cyberattack proactively Gwen Hsieh Sr. Offering Manger, IBM Security
IBM X-Force signatures related to ICS related products and protocols Provides the protection for more than 1,000 high-risk and critical vulnerabilities or attacks. Signatures Severity • Attack signatures for specific vulnerabilities Scada_IGSS_Collection_Chunk_Overflow High in equipment Scada_IGSS_Collection_Traversal Medium Honeywell Scada_IGSSdataServer_Command_Overflow High Siemens PCL Scada_IGSSdataServer_LogText_Format_Strin High g Schneider Electric Scada_IGSSdataServer_RMS_Overflow High Interactive Graphical SCADA System Scada_IGSSdataServer_StdReport_Overflow High KingView / WellinTech Scada_IGSSdataServer_Dir_Traversal Medium RealWin SCADA System / RealFlex LiveData ICCP Server / Live Data Scada_KingView_History_Generic_Overflow High Scada_KingView_History_Opcode3_Overflow High Realwin_Scada_Fcinfotagsetcontrol_Bo High • Attack signatures for ICS, PLC, SCADA Realwin_Scada_HMI_Integer_Overflow High Realwin_Scada_HMI_Multiple_Overflow High protocol anomalies Realwin_Scada_String_Overflow High Distributed Network Protocol (DNP) Scada_DNP_Unknown_Protocol (*) Low Modbus Scada_DNP_Malformed (*) Medium DCOM - Distributed Common Object Model protocol Scada_ICCP_Long_TPDU High Scada_Modbus_IncorrectLength (*) Medium Scada_Modbus_TooLarge (*) Medium • Attack signatures for DNP, Modbus, DCOM DCOM_Scada_Opc_Bo (*) High protocols such as query, restart, etc. Scada_Citect_ODBC_BO High
Thank you
Recommend
More recommend