The powerhouse behind industrial automation, B&R Automation Runtime, utilized in diverse global critical manufacturing sectors, is under the spotlight for a potential security vulnerability. A new cybersecurity advisory issued by CISA highlights a broken or risky cryptographic algorithm in certain versions of B&R’s software—an issue that every systems operator or IT administrator using B&R products should address immediately. Let’s break this down.
The real kicker? Once inside, attackers can intercept or impersonate legitimate communications, slam the brakes on system productivity, or compromise sensitive industrial processes.
B&R identified the following products as vulnerable:
Given that B&R Automation solutions are worldwide in adoption, this vulnerability’s reach isn’t confined. Combine that with the fact that many ICS setups still rely on legacy systems without proper patch management, and you’re looking at prime hunting grounds for cyber threat actors.
Luckily, B&R is on top of the issue and is recommending immediate updates to mitigate the risk:
Thankfully, no known incidents of attackers exploiting this vulnerability have been reported. However, that doesn’t mean you can sit back and relax. Once security advisories like this are made public, malicious actors actively seek out systems that haven’t yet updated their software.
Think of it like your neighborhood burglar reading an online post saying, "These houses use subpar locks!" You can imagine the results if users don’t act quickly.
If you’re managing plant operations, running industrial systems, or even affected tangentially, the stakes go far beyond individual inconveniences. A single breach can cause:
The proactive defense CISA recommends—segments, isolated VLANs, hardened backups—is no longer a team wishlist; it's the only way forward.
For anyone involved in Windows-based ICS facilities, protection isn’t an option. It’s time to double-check configurations, apply patches, and ensure monitoring tools are finely tuned.
Time to patch up before exploits turn this into headline cyber chaos!
Take Action Now
! Apply B&R's updates to Automation Runtime and mapp View immediately. Stay secure, stay vigilant! Share your thoughts or success stories in the comments below!
Source: CISA B&R Automation Runtime | CISA
Overview of the Advisory
- CVSS v3 Base Score: 7.5 (High severity)
- Vulnerability: Use of a Broken or Risky Cryptographic Algorithm (CWE-327)
- Affected Products:
- B&R Automation Runtime (Versions prior to 6.1)
- B&R mapp View (Versions prior to 6.1)
- Risk: Exploitable remotely with a low level of attack complexity.
- CVE Reference: https://www.cve.org/CVERecord?id=CVE-2024-8603
- Potential Consequences: Attackers can pose as legitimate services on impacted devices by exploiting vulnerabilities in SSL/TLS cryptography!
What’s Wrong with the Cryptographic Algorithm?
The "Broken Cryptographic Algorithm" Issue
This vulnerability stems from weak or outdated cryptographic practices embedded in the SSL/TLS libraries used by the software versions prior to 6.1. Simply put:- SSL/TLS protocols handle encryption for secure communications over a network.
- In these versions, the cryptographic foundation is flawed, enabling attackers to exploit it and pretend to be trusted services.
Why is this Dangerous?
In layman’s terms, the cryptographic algorithm is akin to a bad lock on a safe. Attackers can break into the safe with minimal effort. In this case, they can trick your system into believing they're a trusted device.The real kicker? Once inside, attackers can intercept or impersonate legitimate communications, slam the brakes on system productivity, or compromise sensitive industrial processes.
Products at Risk
B&R identified the following products as vulnerable:- B&R Automation Runtime: Versions prior to 6.1
- B&R mapp View: Versions prior to 6.1
Broader Implications: You're Affected Too
Industrial Control Systems (ICS) on the Frontline
These vulnerabilities deeply concern Industrial Control Systems (ICS). ICS encompasses a myriad of device networks responsible for managing manufacturing, energy, and other critical operations. The consequences of failing ICS components could escalate to catastrophic system shutdowns or malicious data manipulations.Given that B&R Automation solutions are worldwide in adoption, this vulnerability’s reach isn’t confined. Combine that with the fact that many ICS setups still rely on legacy systems without proper patch management, and you’re looking at prime hunting grounds for cyber threat actors.
The Fix is Here: Mitigation Steps You NEED to Take
Luckily, B&R is on top of the issue and is recommending immediate updates to mitigate the risk:Updates
- Update to Automation Runtime version 6.1.
- Update to mapp View version 6.1.
- These updates fortify cryptographic protocols, replacing outdated mechanisms with more robust encryption algorithms.
Defensive Measures from CISA:
- Minimize Network Exposure: Keep your control system devices shielded from direct internet access.
- Segment Networks with Firewalls: Isolate control system networks from business-facing or external-facing networks.
- Secure Remote Access:
- Use Virtual Private Networks (VPNs) for remote sessions.
- Ensure VPNs are updated and configured securely since vulnerabilities in VPNs could further expose your system.
- Regularly Monitor: Perform continuous risk assessments on your infrastructure.
No Public Exploits Yet (But Don’t Wait Until There Are!)
Thankfully, no known incidents of attackers exploiting this vulnerability have been reported. However, that doesn’t mean you can sit back and relax. Once security advisories like this are made public, malicious actors actively seek out systems that haven’t yet updated their software.Think of it like your neighborhood burglar reading an online post saying, "These houses use subpar locks!" You can imagine the results if users don’t act quickly.
Why You Should Care Personally
If you’re managing plant operations, running industrial systems, or even affected tangentially, the stakes go far beyond individual inconveniences. A single breach can cause:- Productivity losses and delays.
- Significant economic repercussions.
- The release—or worse, falsification—of valuable intellectual property.
Final Word: A Broader Call for Cybersecurity Vigilance
This advisory adds yet another piece to the puzzle urging manufacturers to stop treating cybersecurity as an afterthought. ICS environments especially face the dual challenge of safeguarding function without hindering operational autonomy.The proactive defense CISA recommends—segments, isolated VLANs, hardened backups—is no longer a team wishlist; it's the only way forward.
For anyone involved in Windows-based ICS facilities, protection isn’t an option. It’s time to double-check configurations, apply patches, and ensure monitoring tools are finely tuned.
Time to patch up before exploits turn this into headline cyber chaos!
Take Action Now

Source: CISA B&R Automation Runtime | CISA
Last edited: