Critical infrastructure at risk again from Stuxnet-like attack
Researchers find gaping flaws in critical systems used in the most importnt industries across the globe


A dozen vulnerabilities including previously undisclosed exploits have been discovered in software used to maintain industrial control systems (ICS) which could lead to another devastating attack on highly-prevalent critical infrastructure.
The researchers from Tenable likened the vulnerabilities to those in the family of devices affected by the infamous Stuxnet attack on an Iranian nuclear facility, adding that the software affected is used across nearly every business vertical.
The vulnerabilities affected four of the most popular ICS vendors: Siemens, Fuji Electric, Schneider Electric, and Rockwell Automation, all of which make some of the most widely used operational technologies in the world.
The researchers notified the vendors of the critical vulnerabilities and have now been patched, but they said remote malicious actors could exploit the software flaws, if left unpatched, to launch targeted attacks, perform administrative functions, unleash malicious code, harvest data or conduct espionage.
Users of the affected systems are urged to check the latest update has been applied, especially now the vulnerabilities have been disclosed.
"The attack scenario cannot be understated as critical systems such as power, water, transportation, and manufacturing all rely on major PLC vendors," said Joseph Bingham, reverse engineer at Tenable. "We will show a theoretical attack using recently discovered vulnerabilities and proof of concept code to disrupt a major power industrial system."
With Siemens' TIA Portal, which was patched this month, attackers could bypass HTTP authentication to gain admin privileges, enabling them to launch malicious firmware updates to modify user permissions or change proxy settings.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The Siemens vulnerability was the most dangerous of the 12 noted by the researchers, but vulnerabilities in the other systems involved remote command execution, memory corruption and stack overflows.
"A simple table with a bunch of exploits to critical vulnerabilities might not feel very impactful to many people... [but] Stuxnet only needed 3 new vulnerabilities to spread through an isolated network and damage centrifuges in the targeted Iranian nuclear facility, said Bingham. "Any of the vulnerabilities listed above could have been discovered by a threat actor and used as a key component in a targeted attack to disrupt or damage industrial hardware."
In a proof of concept exercise run by the researchers in a simulated nuclear reactor, they were able to show how just one exploited vulnerability could lead to major emergency detection systems in a plant being rendered useless, potentially causing a total nuclear meltdown.
"Attacks on critical infrastructure go well-beyond cyberspace -- they have the potential to cause physical damage and harm," said Renaud Deraison, chief technology officer and co-founder, Tenable. "And the threats to these often delicate systems cannot be overstated."

Connor Jones has been at the forefront of global cyber security news coverage for the past few years, breaking developments on major stories such as LockBit’s ransomware attack on Royal Mail International, and many others. He has also made sporadic appearances on the ITPro Podcast discussing topics from home desk setups all the way to hacking systems using prosthetic limbs. He has a master’s degree in Magazine Journalism from the University of Sheffield, and has previously written for the likes of Red Bull Esports and UNILAD tech during his career that started in 2015.
-
Meta just revived plans to train AI models using European user data
News Meta has confirmed plans to train AI models using European users’ public content and conversations with its Meta AI chatbot.
By Nicole Kobie
-
AI is helping bad bots take over the internet
News Automated bot traffic has surpassed human activity for the first time in a decade, according to Imperva
By Bobby Hellard
-
Hackers are targeting Ivanti VPN users again – here’s what you need to know
News Ivanti has re-patched a security flaw in its Connect Secure VPN appliances that's been exploited by a China-linked espionage group since at least the middle of March.
By Emma Woollacott
-
Broadcom issues urgent alert over three VMware zero-days
News The firm says it has information to suggest all three are being exploited in the wild
By Solomon Klappholz
-
Nakivo backup flaw still present on some systems months after firms’ ‘silent patch’, researchers claim
News Over 200 vulnerable Nakivo backup instances have been identified months after the firm silently patched a security flaw.
By Solomon Klappholz
-
Everything you need to know about the Microsoft Power Pages vulnerability
News A severe Microsoft Power Pages vulnerability has been fixed after cyber criminals were found to have been exploiting unpatched systems in the wild.
By Solomon Klappholz
-
Vulnerability management complexity is leaving enterprises at serious risk
News Fragmented data and siloed processes mean remediation is taking too long
By Emma Woollacott
-
A critical Ivanti flaw is being exploited in the wild – here’s what you need to know
News Cyber criminals are actively exploiting a critical RCE flaw affecting Ivanti Connect Secure appliances
By Solomon Klappholz
-
Researchers claim an AMD security flaw could let hackers access encrypted data
News Using only a $10 test rig, researchers were able to pull off the badRAM attack
By Solomon Klappholz
-
A journey to cyber resilience
whitepaper DORA: Ushering in a new era of cyber security
By ITPro