All information products included in https://us-cert.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://www.us-cert.gov/tlp/.
Independent security researcher Rubén Santamarta has reported multiple vulnerabilities in the Nordex Control 2 product. ICS-CERT has reached out to Nordex and will continue to work with them to validate the researcher’s claim.
The report discusses an unauthenticated directory traversal vulnerability that exposes directory listings and user credentials. The report also reveals a SessionID prediction vulnerability that may allow an attacker to hijack a valid user’s session. Successful exploitation of these vulnerabilities could allow an attacker control over a wind turbine farm.
Nordex Control 2 is a software product used with Nordex wind turbines. The Control 2 software analyzes data from connected sensors and generates control signals for a single wind turbine or an entire wind turbine farm. Functions such as starting, stopping and yawing can be controlled using Nordex Control 2.
- Placing all control systems assets behind firewalls, separated from the business network.
- Implementing network or host-based firewall rules to limit network access to critical systems.
- Deploying secure remote access methods such as Virtual Private Networks (VPNs) for remote access.
ICS-CERT will provide additional information as it becomes available.
For any questions related to this report, please contact the CISA at:
Toll Free: 1-888-282-0870
CISA continuously strives to improve its products and services. You can help by choosing one of the links below to provide feedback about this product.