Barracuda protects industrial IoT with network-based firewall


Many industrial IoT systems have open doors that create unintended vulnerabilities. 

What information could be exposed by open communications protocols? How do hackers identify vulnerable systems? What security resources are available? How do IoT firewalls protect against such threats?

TCP Port 502 vulnerabilities

Many industrial systems use TCP Port 502, which allows two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and that packets will be delivered on port 502 in the same order in which they were sent. This creates the risk of remote attackers to install arbitrary firmware updates via a MODBUS 125 function code to TCP port 502. Scans from services such as Shodan identify systems that have an open TCP port 502 that could be vulnerable.

Security auditing firms such as Splone identify threats with scans and other penetration testing techniques to propose counter-measures. A scan returns the host’s IP address, open ports, the country, the vendor, the product and firmware information.

Leave a Reply

Your email address will not be published. Required fields are marked *