Главная
Study mode:
on
1
Intro
2
Vulnerability Researchers
3
Vulnerabilities identified in Treck TCP/IP Stack
4
The Bugs
5
Devices with Treck TCP/IP stack
6
Devices Tested
7
Generic PLC Architecture
8
Generally, Ethernet processors
9
Deep dive into APC SmartUPS
10
Shallow dive into Digi Connect Wi ME 9210
11
Deep dive into Digi Connect Wi ME 9210
12
Deep dive into Schneider Electric SCADAPack RTU
13
Deep dive into ABB REF615
14
Deep dive into Opto 22 SNAP-PAC-S1
15
Impact Summary
16
Current detection strategy for Ripple20
17
Prevention Strategy
18
Impacted Devices: Silver Lining
19
Research Implications
20
LINKS!
Description:
Explore the critical Ripple20 vulnerability in Industrial IoT systems through a comprehensive webinar presented by Dragos Senior Vulnerability experts. Gain insights into the analysis of this widely deployed yet difficult-to-detect vulnerability, its impact on various devices, and strategies for detection and prevention. Delve into detailed examinations of affected devices, including APC SmartUPS, Digi Connect Wi ME 9210, Schneider Electric SCADAPack RTU, ABB REF615, and Opto 22 SNAP-PAC-S1. Learn about the implications of this research for industrial cybersecurity and discover valuable resources for further information on this significant threat to ICS environments.

Ripple20 Vulnerabilities in Industrial IoT - Analysis and Mitigation Strategies

Dragos: ICS Cybersecurity
Add to list
0:00 / 0:00