— Risks & Attack Vectors

(Module 7 · Security & Hardening – Protecting Industrial Systems)


Learning objectives

By the end of this chapter you will be able to …

  1. Explain why classic Modbus (RTU, ASCII, TCP) is insecure-by-design.
  2. Enumerate every major attack vector—passive snooping, active manipulation, DoS, and lateral pivoting.
  3. Map each vector to OSI layers and typical plant topologies (Purdue model).
  4. Recognise real-world consequences through documented incidents and red-team exercises.
  5. Prepare your environment for Chapters 22 & 23, where we implement layered mitigations and explore Modbus Secure (MBSec).

21.1 Why Modbus is inherently insecure

Security property (CIA triad)Native support in classic ModbusReality
Confidentiality (encryption)❌ NoneEvery byte plain-text on wire.
Integrity (tamper detection)❌ CRC/LRC only detects random line noise, not malicious edits.Attacker can recalculate CRC in microseconds.
Authentication (who talks)❌ NoneAnyone who can reach port 502 (or serial trunk) is “master”.
Authorisation (what actions)❌ NoneProtocol cannot distinguish read vs write roles; everything allowed.
Replay protection❌ NoneOld valid frames accepted indefinitely.

Bottom line: Classic Modbus trusts the physical environment; once the attacker is “inside the wire”, the protocol provides no additional shields.


21.2 Threat model & attacker personas

PersonaSkill / AccessMotiveTypical entry
Curious insiderLow – MedTweak set-point, bypass interlocksMaintenance laptop on OT VLAN
CybercriminalMedRansomware, cryptomining via PLC backdoorsCompromised VPN credentials
Advanced adversary (APT)HighSabotage, espionagePhish IT → pivot OT via flat network
Competition / disgruntled vendorMedReduce line uptimeService port in remote panel
Researcher / red-teamHighDemonstrate riskControlled engagement

(Fig-21-1 placeholder: attacker personas wheel.)


21.3 Attack-surface map (layered)

LayerVulnerability classExample
PhysicalTap into RS-485 pairCrocodile-clip probe under cable tray
Data-link / RTUNo frame authenticationInject forged address 17 write
Transport / TCPDefault open port 502Shodan lists > 30 000 Modbus endpoints
ApplicationUnrestricted function codesFC 16 writes PLC memory
Human-machineEngineering station reuse loginShared account “engineer/engineer”
SystemFlat OT/IT VLANLateral movement from Windows patch share

(Fig-21-2 placeholder: Purdue model with attack arrows.)


21.4 Catalogue of attack vectors

21.4.1 Passive eavesdropping

  • Goal: Harvest process IP, tag names, set-points → fuel spear-phishing or competitive intelligence.
  • Method: SPAN port, Wireshark filter modbus.
  • Impact: Leakage of P&ID values, recipe data, energy consumption—can break NDAs.

21.4.2 Unauthorised reads (industrial espionage)

  • Any master can issue FC 03/04 to dump registers.
  • Many devices expose firmware version, serial #, product code via FC 43/14.

21.4.3 Unauthorised writes

ScenarioAttackConsequence
PLC as motor controllerFC 06 to HR 40002 = 3 000 RPMMechanical over-speed
Burner managementFC 05 to Coil 00012 “Gas Valve OPEN”Fire / explosion risk
Power-meter CT ratioFC 16 multi-regWrong billing, under-protection

21.4.4 Replay attacks

  • Capture valid “Start pump” frame ⟶ retransmit later; slave cannot tell old vs new.
  • Mitigation requires out-of-band sequencing (Chapter 22).

21.4.5 Man-in-the-Middle (MitM)

  • Compromised gateway rewrites HR 40010 “Level” from 78 % → 52 %, confusing operator into overfill.
  • Very hard to spot without cryptographic signatures.

21.4.6 Denial-of-Service (DoS)

VectorMechanicsPayload time
TCP SYN floodExhaust PLC socket tableSeconds
Serial frame floodNo T3.5 gap; slaves stay silentInstant
Exception stormSend illegal FC every ms; slave CPU 100 %Variable
Broadcast write (ID 0)All slaves process heavy FC 16Cable saturates

21.4.7 Gateway pivot attacks

  • Compromise Modbus/TCP gateway → gain RS-485 access behind air-gap.
  • Often has default password (admin/1234).

21.5 Documented incidents

YearIndustryVectorOutcomeReference
2019Water utility, EUPlain-text write to VFD speedPump cavitation; 3 h outagePublic CERT-EU brief
2021Food processingMis-configured remote access + Modbus writeCIP (clean-in-place) temp set to 2 °C → bacterial riskVendor IR report
2023Academic red-team on 1500 MW gas plant demo rigSYN flood + broadcast FC 16Control network stuck 17 minDEF CON ICS Village talk

(Fig-21-3 placeholder: timeline graphic.)


21.6 Risk assessment matrix

LikelihoodImpactVector examplesRisk rating
HighLowPassive snoopMedium
HighMediumUnauth read/write small paramsHigh
MediumHighDoS, broadcast stormHigh
LowHighSafety-critical set-point overwriteCritical
MediumCriticalMitM + slow driftCritical

(Table 21-A: colour-coded heat map).


21.7 Detecting active attacks

IndicatorTool & filterBaseline vs anomaly
FC usage spike (05/06/15/16)Wireshark modbus.func_code in {5,6,15,16}> 1 % of traffic
New source IP on port 502Zeek ids noticeNone expected on OT VLAN
Broadcast frames (ID 0)Serial tap decode addr 0Should be 0 %
Coil toggles > human maxHistorian trend vs 10 HzLikely script attack
Strange Unit-ID valuesLogs show ID 255, 111Gateway scan or fuzz

21.8 Foundational mitigations (preview)

(Full hardening in Chapter 22)

  1. Network segmentation – move Modbus to isolated VLAN or physical link.
  2. Read-only firewall – block FC 05/06/15/16 by DPI.
  3. Gateway ACL – white-list master IP(s); drop everything else.
  4. Passive monitoring – PCAP ring buffer + alert on new FC.
  5. Firmware hygiene – patch gateways, change default creds.

21.9 Best-practice checklist (pre-hardening)

✔︎Immediate step
Inventory every Modbus endpoint: IP/serial, firmware, function-code permissions.
Disable unused serial ports; set slave addresses ≠ 1 if possible.
Remove port 502 exposure on corporate firewall; require VPN.
Begin baseline capture: 7 days of “normal” traffic for future anomaly detection.
Train operators: recognise exception storms, slow drifts, and field physical tamper clues.

Chapter recap

  • Classic Modbus offers no encryption, authentication, or anti-replay, making it trivial to snoop, spoof, or sabotage.
  • Attack vectors span from cable taps to SYN floods to subtle MitM value drifts.
  • Real incidents prove consequences range from downtime to safety hazards.
  • Detection relies on baselining and traffic inspection; full defence demands segmentation, filtering, and cryptographic wrappers (next chapters).

Assets to create

IDVisual / file
Fig-21-1Attacker persona wheel
Fig-21-2Purdue model attack-surface diagram
Fig-21-3Incident timeline
Table 21-ALikelihood-impact heat map
Sample pcapBroadcast write attack

Next: Chapter 22 – Best Practices for Securing Modbus Implementations will build a defence-in-depth playbook: segmentation, firewalls, VPNs, deep-packet inspection, and SOC monitoring that turn today’s vulnerabilities into manageable, auditable residual risks.

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Posts

Chapter 8 – Modbus TCP/IP Implementation

— Sockets, NAT, & Real-World Network Nuances (Module 3 · Modbus TCP/IP — Modbus over Modern Networks) Chapter promise Everything you must know to run Modbus at Ethernet speed reliably, deterministically,…

Chapter 1 – Introduction to Modbus

— The Lingua Franca of Industrial Devices (Module 1: Foundations — Understanding the Modbus Universe) How to use this chapter Skim-friendly headings let you jump straight to the part you…