Ripple20 Vulnerabilities in Industrial IoT - Analysis and Mitigation Strategies
Offered By: Dragos: ICS Cybersecurity via YouTube
Course Description
Overview
Explore the critical Ripple20 vulnerability in Industrial IoT systems through a comprehensive webinar presented by Dragos Senior Vulnerability experts. Gain insights into the analysis of this widely deployed yet difficult-to-detect vulnerability, its impact on various devices, and strategies for detection and prevention. Delve into detailed examinations of affected devices, including APC SmartUPS, Digi Connect Wi ME 9210, Schneider Electric SCADAPack RTU, ABB REF615, and Opto 22 SNAP-PAC-S1. Learn about the implications of this research for industrial cybersecurity and discover valuable resources for further information on this significant threat to ICS environments.
Syllabus
Intro
Vulnerability Researchers
Vulnerabilities identified in Treck TCP/IP Stack
The Bugs
Devices with Treck TCP/IP stack
Devices Tested
Generic PLC Architecture
Generally, Ethernet processors
Deep dive into APC SmartUPS
Shallow dive into Digi Connect Wi ME 9210
Deep dive into Digi Connect Wi ME 9210
Deep dive into Schneider Electric SCADAPack RTU
Deep dive into ABB REF615
Deep dive into Opto 22 SNAP-PAC-S1
Impact Summary
Current detection strategy for Ripple20
Prevention Strategy
Impacted Devices: Silver Lining
Research Implications
LINKS!
Taught by
Dragos: ICS Cybersecurity
Related Courses
Embedded Systems - Shape The World: Microcontroller Input/OutputThe University of Texas at Austin via edX Model Checking
Chennai Mathematical Institute via Swayam Introduction to the Internet of Things and Embedded Systems
University of California, Irvine via Coursera Sistemas embebidos: Aplicaciones con Arduino
Universidad Nacional Autónoma de México via Coursera Quantitative Formal Modeling and Worst-Case Performance Analysis
EIT Digital via Coursera