The OPC UA protocol is an upcoming de-facto standard for building Industry 4.0 processes in Europe, and one of the few industrial protocols that promises security features to prevent attackers from manipulating and damaging critical infrastructures. Despite the importance of the protocol, challenges in the adoption of OPC UA's security features by product vendors, libraries implementing the standard, and end-users were not investigated so far. In this work, we systematically investigate 48 publicly available artifacts consisting of products and libraries for OPC UA and show that 38 out of the 48 artifacts have one (or more) security issues. In particular, we show that 7 OPC UA artifacts do not support the security features of the protocol at all. In addition, 31 artifacts that partially feature OPC UA security rely on incomplete libraries and come with misleading instructions. Consequently, relying on those products and libraries will result in vulnerable implementations of OPC UA security features. To verify our analysis, we design, implement, and demonstrate attacks in which the attacker can steal credentials exchanged between victims, eavesdrop on process information, manipulate the physical process through sensor values and actuator commands, and prevent the detection of anomalies.
翻译:OPC UA协议是在欧洲建设工业4.0流程的即将出台的离法标准,也是保证安全特征防止袭击者操纵和破坏关键基础设施的少数工业协议之一。尽管议定书很重要,但产品供应商、实施标准的图书馆和终端用户在采用OPC UA安全特征方面遇到了挑战,迄今为止尚未对产品供应商、实施标准的图书馆和终端用户在采用OPC UA安全特征方面遇到了挑战。在这项工作中,我们系统地调查了48种公开可得的由OPC UA产品和图书馆组成的文物48件,表明48件文物中有38件存在一个(或更多的)安全问题。特别是,我们表明OPC UA的7件艺术品根本不支持协议的安全特征。此外,部分以OPC UA安全为主的31件艺术品依赖于不完整的图书馆,并附有误导性指示。因此,依赖这些产品和图书馆将导致对OPC UA安全特征的脆弱实施。为了核实我们的分析,我们设计、执行和证明攻击者可以窃取受害者之间交换的证明证据的攻击,窃取过程信息,通过传感器值值和动作指令对物理过程进行操纵过程过程过程程序,通过检测,通过传感器和检查异常器指令对物理过程进行操纵过程进行控制。