Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

US Nuclear Regulator Warns on Worms
Computer Business Review ^ | September 6, 2003

Posted on 09/05/2003 9:01:34 PM PDT by Hal1950

The US Nuclear Regulatory Commission this week warned nuclear power plant operators to implement safeguards against the Slammer worm, which took systems at one such plant offline in January.

The advisory details exactly how the Davis-Besse power plant in Ohio, operated by FirstEnergy Corp, had its "safety parameter display system" and "plant process computer" made unavailable for several hours by the worm.

The news of the outage came to light after a report by SecurityFocus.com two weeks ago. It is particularly concerning as Slammer was preventable - it exploited a vulnerability in SQL Server that Microsoft Corp had issued a patch for six months earlier.

The NRC said its advisory, dated August 29, is intended to alert power plant operators of "the recent identification of a potential vulnerability of the plant computer network to infection" by Slammer.

According to the NRC, on January 25 the safety parameter display system became unavailable for almost five hours due to the infection, which flooded the network with traffic, and the plant process computer was unavailable for over six hours.

The NRC said in a statement that regulations require systems directly related to safety to be isolated from the network or to have send-only capabilities. The agency said the two systems infected do not affect the safe operation of nuclear power plants.

Davis-Besse has been out of operation since February 2002 at an estimated cost of $500m, due to an NRC inspection that found a corrosion hole in the reactor's carbon steel lid, according to the Cleveland Plain Dealer newspaper.

According to the NRC's advisory, the Slammer worm was able to infect the plant via FirstEnergy's corporate network, to which it is connected. The corporate network was in turn infected via an unsecured T-1 connection put in place by a third-party contractor.

The FirstEnergy network did have a firewall in place that was configured to block UDP, the protocol on which Slammer traveled, but the undocumented and insecure T-1 essentially made this useless.

The NRC also said that plant IT staff were not aware that there was a vulnerability in SQL Server, or that there was an exploit on the loose, despite the fact that Microsoft and the CERT Coordination Center had issued advisories on both.

The NRC said that Davis-Besse have now added procedures for documenting external network connections, patching against this one specific vulnerability, and reviewing future patch advisories. The plant has also put a firewall between itself and its corporate network.


TOPICS: Business/Economy; Crime/Corruption; Foreign Affairs; Front Page News; Government; News/Current Events; Politics/Elections
KEYWORDS: blackouts; bugs; computers; computersecurityin; cyberwarfare; firstenergy; microsoft; nrc; nuke; power; slammer; virus; warning; worm

1 posted on 09/05/2003 9:01:34 PM PDT by Hal1950
[ Post Reply | Private Reply | View Replies]

To: Hal1950
What kind of worms?

http://www.freerepublic.com/focus/f-news/977054/posts
2 posted on 09/05/2003 9:03:31 PM PDT by ConservativeMan55
[ Post Reply | Private Reply | To 1 | View Replies]

Comment #3 Removed by Moderator

To: seamole
Wow. That sounds series.
4 posted on 09/05/2003 9:14:57 PM PDT by ConservativeMan55
[ Post Reply | Private Reply | To 3 | View Replies]

To: Hal1950
When the box goes unpatched for six months, the IT shop needs a collective b****-slap.
5 posted on 09/05/2003 9:16:54 PM PDT by Poohbah (Crush your enemies, see them driven before you, and hear the lamentations of their women.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Hal1950
The NRC also said that plant IT staff were not aware that there was a vulnerability in SQL Server, or that there was an exploit on the loose, despite the fact that Microsoft and the CERT Coordination Center had issued advisories on both.

If my IT staff said that to me, they'd be out of jobs. SQL Slammer was a nearly 100% preventable attack through Microsoft alone. 100% preventable if you had the proper software in place as a safeguard. Being vulnerable to SQL Slammer was almost inexcuseable as admins had over 6 months to patch. MS Blaster was a different story due to the exploit being released only 4 weeks after the vulnerability was released.

6 posted on 09/05/2003 9:17:49 PM PDT by xrp
[ Post Reply | Private Reply | To 1 | View Replies]

Comment #7 Removed by Moderator

To: Hal1950

8 posted on 09/05/2003 9:19:13 PM PDT by sigSEGV
[ Post Reply | Private Reply | To 1 | View Replies]

To: xrp
MS Blaster was a different story due to the exploit being released only 4 weeks after the vulnerability was released.

I was Blaster-proof via Windows Update long before it ever showed up.

9 posted on 09/05/2003 9:22:47 PM PDT by Poohbah (Crush your enemies, see them driven before you, and hear the lamentations of their women.)
[ Post Reply | Private Reply | To 6 | View Replies]

Using SQL Server, or IIS, on anything this critical should be cause for termination.
10 posted on 09/05/2003 10:02:13 PM PDT by D-fendr
[ Post Reply | Private Reply | To 9 | View Replies]

To: Hal1950
Why nuclear power plant controls are connected to any network escapes me. The only thing I saw in the article was for corporate bureaucracy. The actual controls don't need to be connected. The plant should be a stand alone system. Another (network) system could be put in place to display/transmit information.
11 posted on 09/05/2003 10:15:40 PM PDT by ampat
[ Post Reply | Private Reply | To 1 | View Replies]

To: Poohbah
Imagine being a sysadmin, dbadmin or desktop admin responsible for dozens of databases (you don't blindly patch databases) dozens or hundreds of servers or hundreds or thousands (or even tens of thousands) of desktops. Think you could have all those patched and rebooted in 4 weeks? ;-)

HINT: MANY companies have restrictions in place that allow their critical servers to only be rebooted once a month, once a quarter -- even only once a year.

12 posted on 09/05/2003 10:47:10 PM PDT by xrp
[ Post Reply | Private Reply | To 9 | View Replies]

To: belmont_mark
PING!
13 posted on 09/05/2003 11:35:09 PM PDT by Orion78 (I WILL NEVER FORGET!!! FREE IRAN!!! BUSH 2004!!!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: joanie-f; snopercod
Bump.
14 posted on 09/05/2003 11:40:01 PM PDT by First_Salute
[ Post Reply | Private Reply | To 1 | View Replies]

To: seamole; First_Salute
This is literally the nuclear equivalent of issuing Mohammed Atta a student visa in 2002.

Well, not really. You need to understand the purpose of these "plant parameter displays". They were originally installed after Three-Mile_Island so that the management could dial in from home and see what was going on in the plant.

They are for information only and control nothing.

People don't seem to realize that the newest nuclear plants completed in the US were built with 60's analog technology, much of it 3-15 PSI pneumatic!

Sure, they have pasted on a few digital monitoring systems over the years, but that's all they do: monitor.

15 posted on 09/06/2003 3:07:52 AM PDT by snopercod (And if it is a despot you would dethrone, see first that his throne erected within you is destroyed.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Hal1950
A firewall is NOT good enough. I am on my third computer because the other ones crashed due to infectious intrusions. Nuclear power plant computer systems should be totally isolated from ANY outside interference.
16 posted on 09/06/2003 6:46:33 AM PDT by DianaN (Eternal Freedom)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson