ICS Alert

Nordex Control 2 - Multiple Vulnerabilities

Last Revised
Alert Code
ICS-ALERT-10-307-01

table.gridtable {
font-family: verdana,arial,sans-serif;
font-size:11px;
color:#333333;
border-width: 1px;
border-color: #666666;
border-collapse: collapse;
}
table.gridtable th {
border-width: 1px;
padding: 8px;
border-style: solid;
border-color: #666666;
background-color: #dedede;
}
table.gridtable td {
border-width: 1px;
padding: 8px;
border-style: solid;
border-color: #666666;
background-color: #ffffff;
}

SUMMARY

Independent security researcher Rubén Santamarta has reported multiple vulnerabilities in the Nordex Control 2 product. ICS-CERT has reached out to Nordex and will continue to work with them to validate the researcher’s claim.

The report discusses an unauthenticated directory traversal vulnerability that exposes directory listings and user credentials. The report also reveals a SessionID prediction vulnerability that may allow an attacker to hijack a valid user’s session. Successful exploitation of these vulnerabilities could allow an attacker control over a wind turbine farm.

Nordex Control 2 is a software product used with Nordex wind turbines. The Control 2 software analyzes data from connected sensors and generates control signals for a single wind turbine or an entire wind turbine farm. Functions such as starting, stopping and yawing can be controlled using Nordex Control 2.

Mitigations

MITIGATION

ICS-CERT recommends:

  • Placing all control systems assets behind firewalls, separated from the business network.
  • Implementing network or host-based firewall rules to limit network access to critical systems.
  • Deploying secure remote access methods such as Virtual Private Networks (VPNs) for remote access.

ICS-CERT will provide additional information as it becomes available.

This product is provided subject to this Notification and this Privacy & Use policy.

Vendor

Nordex