CVE-2024-35246

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to cause denial-of-service by flooding affected systems with repeated packets. It affects industrial control systems and related software that process network communications. Organizations using vulnerable ICS/SCADA systems are at risk.

💻 Affected Systems

Products:
  • Industrial control systems and SCADA software from multiple vendors
Versions: Multiple versions across different vendors - check specific vendor advisories
Operating Systems: Various real-time operating systems and embedded systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with network interfaces enabled. Specific products and versions vary by vendor - consult CISA ICSA-24-172-03 for details.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system unavailability leading to operational disruption, production downtime, and potential safety impacts in industrial environments.

🟠

Likely Case

Service degradation or temporary unavailability requiring system restart and operational impact.

🟢

If Mitigated

Minimal impact with proper network segmentation, rate limiting, and monitoring in place.

🌐 Internet-Facing: HIGH - Directly exposed systems can be easily flooded from the internet.
🏢 Internal Only: MEDIUM - Requires internal network access but still exploitable by insiders or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple packet flooding attack requiring no authentication. Attack tools for DoS are widely available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Vendor-specific - check individual vendor updates

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-24-172-03

Restart Required: Yes

Instructions:

1. Identify affected systems using vendor documentation. 2. Apply vendor-provided patches or updates. 3. Restart affected systems. 4. Verify patch application.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate ICS systems from untrusted networks using firewalls and VLANs

Rate Limiting

all

Configure network devices to limit packet rates to vulnerable systems

🧯 If You Can't Patch

  • Implement strict network access controls and segmentation
  • Deploy intrusion prevention systems with DoS protection capabilities

🔍 How to Verify

Check if Vulnerable:

Check system versions against vendor-specific vulnerability lists in ICSA-24-172-03

Check Version:

Vendor-specific - consult system documentation

Verify Fix Applied:

Verify patch version installation and test system resilience to packet flooding

📡 Detection & Monitoring

Log Indicators:

  • Unusually high packet rates
  • System resource exhaustion alerts
  • Connection flood warnings

Network Indicators:

  • Spike in incoming packets to ICS ports
  • Abnormal traffic patterns from single sources

SIEM Query:

source_ip_count > threshold AND dest_port IN (ics_ports) WITHIN 1m

🔗 References

📤 Share & Export