For this blog, we will continue discussing our evaluated vendors and highlighting findings that we discovered during our research.
Haas was the first vendor we focused on because of the fast availability of its controller. We began our analysis by conducting port scanning on the controller simulator and identifying the protocols exposed by the controller. After that, we evaluated the options with which an attacker could abuse the protocols to perform attacks aimed at the security of the machine and verified these attacks in practice on a real-world machine installation.
Okuma stands out in the market of CNC controllers for one interesting feature: the modularity of its controller. While the vendor offers in the device’s simplest form a tiny controller, it also provides a mechanism, called THINC API, to highly customize the functionalities of the controller. With this technology, any developer can implement a program that, once installed, runs in the context of the controller, in the form of an extension. This approach is very similar to how a mobile application, once installed, can extend a smartphone’s functionalities.
In the spirit of the Industry 4.0 paradigm, Heidenhain offers the Heidenhain DNC interface to integrate machines on modern, digital shop floors. Among the many scenarios, Heidenhain DNC enables the automatic exchange of data with machine and production data acquisition (MDA/PDA) systems, higher level enterprise resource planning (ERP) and manufacturing execution systems (MESs), inventory management systems, computer-aided design and manufacturing (CAD/CAM) systems, production activity control systems, simulation tools, and tool management systems
In our evaluation, we had access to the library provided by Heidenhain to the integrators to develop interfaces for the controller. The manufacturer provides this library, called RemoTools SDK,35 to selected partners only.
Like Heidenhain, Fanuc offers an interface, called FOCAS,36 for the integration of CNC machines in smart network environments. Even though this technology offers a restricted set of remote-call possibilities compared with the other vendors’ (that is, a limited number of management features), our experiments showed that a miscreant could potentially conduct attacks like damage, DoS, and hijacking.
BlogofInnovation.com
BLR Tools launched a new update with Great Capabilities in the BLR MBOX File Converter. The product line of BLR…
BUFFALO, N.Y., Dec. 31, 2024 (SEND2PRESS NEWSWIRE) — Author and reality TV personality Johnny Stanz has released his debut children’s…
SYDNEY, Australia, Jan. 2, 2025 (SEND2PRESS NEWSWIRE) — Renowned architect, artist, and philosopher Jamil Elias Kabalan has released his latest…
BRISBANE, Australia, Jan. 3, 2025 (SEND2PRESS NEWSWIRE) — Prepare for a rollicking, unpredictable adventure in “2nd Last Chance” (ISBN: 978-1779621689),…
CLEVELAND, Ohio, Jan. 6, 2025 (SEND2PRESS NEWSWIRE) — Top mortgage industry podcast The Big Picture, broadcast live every Thursday at…
BAROSSA VALLEY, Australia, Jan. 9, 2025 (SEND2PRESS NEWSWIRE) — In “The Traffic of a Lie” (ISBN: 978-1998482054), released by Tellwell…