Information Notice 2003-14, Potential Vulnerability of Plant Computer Network to Worm Infection

From kanterella
(Redirected from Information Notice 2003-14)
Jump to navigation Jump to search
Potential Vulnerability of Plant Computer Network to Worm Infection
ML032410430
Person / Time
Issue date: 08/29/2003
From: Beckner W
NRC/NRR/DIPM
To:
Lee S S, NRR/IROB/OES 415-1061
References
FOIA/PA-2003-0399 IN-03-014
Download: ML032410430 (8)


UNITED STATES

NUCLEAR REGULATORY COMMISSION

OFFICE OF NUCLEAR REACTOR REGULATION

WASHINGTON, DC 20555-0001 August 29, 2003 NRC INFORMATION NOTICE 2003-14: POTENTIAL VULNERABILITY OF PLANT

COMPUTER NETWORK TO WORM INFECTION

Addressees

All holders of operating licenses for nuclear power reactors, except those who have

permanently ceased operations and have certified that fuel has been permanently removed

from the reactor vessel.

Purpose

The U.S. Nuclear Regulatory Commission (NRC) is issuing this information notice to alert

addressees to the recent identification of a potential vulnerability of the plant computer network

server to infection by the Microsoft (MS) SQL Server worm. The NRC anticipates that

recipients will review the information for applicability to their facilities and consider taking

appropriate actions to prevent the MS SQL Server worm from infecting their plant network

servers. However, suggestions contained in this information notice are not NRC requirements;

therefore, no specific action or written response is required.

Background

Microsoft (MS) SQL Server 2000 is a database software program for network servers. The

program contains a remotely exploitable stack buffer overflow that is vulnerable to potential

hackers. When an overflow occurs, arbitrary code can be executed on the victim system with

the user privileges of the SQL Server. Once a server is compromised, the MS SQL Server

2000 Worm propagates itself by making packets of 376 bytes and sending them to randomly

chosen Internet Protocol (IP) addresses User Datagram Protocol (UDP) port 1434. If the

packet is sent to a vulnerable machine, the machine becomes infected and begins to

propagate. This worm activity is readily identifiable on the computer network by the presence of

376-byte UDP packets. Microsoft Corporation identified this vulnerability in the SQL Server

2000 and issued a security patch on July 10, 2002. When Microsoft Corporation releases a

patch to fix a problem for its software, the full details of the vulnerability of the product are

disclosed.

Description of Circumstances

On January 25, 2003, Davis-Besse nuclear power plant was infected with the MS SQL Server

2000 worm. The infection caused data overload in the site network, resulting in the inability of

the computers to communicate with each other. The slowness in computer processing speed

began in the morning and by 4:50 p.m., the Safety Parameter Display System (SPDS) became

unavailable and remained unavailable for 4 hours4.62963e-5 days <br />0.00111 hours <br />6.613757e-6 weeks <br />1.522e-6 months <br /> 50 minutes. By 5:13 p.m., the plant process

computer was lost and remained unavailable for 6 hrs and 9 minutes. Although the operators

were burdened by these losses, the event was not deemed significant since the plant control

and protection functions were not affected.

Because the MS SQL worm resided in only memory, shutting down the server removed the

worm from the servers memory, ridding the server of the infection. The licensee isolated the

server from the site network, installed the MS security patch, and reconnected the server to the

site network.

Discussion

First Energy Nuclears (the licensees) corporate network, which is linked with Davis-Besses

plant network, is connected to external networks via a firewall. A firewall is a system or

systems that enforce an access control policy between networks. Among the many access

control policies that Davis-Besses corporate firewall enforced was the policy of disallowing any

data using the UDP into the network by closing port 1434 of the firewall. This policy would have

protected Davis-Besses networks from the MS SQL worm infection except that the corporate

network had a T1 connection behind the firewall that provided a path for the worm to enter the

system. This T1 line was used by one of the licensees consultants who provided an application

software that ran on a server. This connection bypassed all the access control policies that the

corporate firewall was enforcing, including the policy of preventing data that used the UDP from

coming into the corporate network.

The consultants company network server allowed use of the UDP for data transfers and was

infected by the MS SQL worm. When the consultant established a T1 line connection at the

licensees corporate site, this action opened a path by which the worm that infected the

consultants company server was sent to the licensees corporate network through the T1 line.

The worm then randomly infected any servers on the corporate network that had port 1434 open.

Two primary causes for this worm infection were noted:

1. The T1 connection behind the firewall

The corporate network would not have been infected by the worm if the consultants T1 line had been connected in front of the firewall. In February 2002, the NRC issued a

security order which alerted licensees to external connections that bypass network

protective measures. Subsequent to this event, the licensee noted that the

implementation of the order was addressed by the Information Technology personnel;

however, their activities were not communicated to the plant computer engineers.

2. Unawareness of Software Security Patch

The plant computer engineering personnel had not been aware of the security patch that

Microsoft released on July 10, 2002, to fix the Microsoft SQL Server 2000 vulnerability

that the MS SQL worm exploited. In addition, on January 25, 2003, Microsoft issued an

alert about the MS SQL worm. On the same day, CERT Coordination Center, a federally funded research and development center that provides Internet security

expertise, also issued Advisory CA-2003-04, MS-SQL Server Worm. A revision to this

advisory was issued on January 27, 2003.

In response to this event, Davis-Besse implemented the following corrective actions:

(1) required network services to document all external connections to internal network,

(2) installed the security patch for the MS SQL Server 2000 vulnerability, (3) installed a firewall

between the plant network and the corporate network, (4) established a requirement to monitor

and filter the data coming into the plant network to the same standard as the corporate firewall, and (5) implemented a process for computer engineering personnel to review security patches

for systems supported and install them within an acceptable timeframe.

This information notice requires no specific action or written response. If you have any

questions about the information notice in this notice, please contact one of the technical

contacts listed below or the appropriate project manager in the NRCs Office of Nuclear Reactor

Regulation (NRR).

/RA/

William D. Beckner, Chief

Reactor Operations Branch

Division of Inspection Program Management

Office of Nuclear Reactor Regulation

Technical contacts: Samuel S. Lee Matthew Chiramal

(301) 415-1061 (301) 415-2845 E-mail: ssl@nrc.gov E-mail: mxc@nrc.gov

Eric J. Lee

(301) 415-8099 E-mail: exl@nrc.gov

Attachment: List of Recently Issued NRC Information Notices

ML032410430

OFFICE IROB:DIPM Tech Editor EEIB:DE NSIR

NAME SSLee PKleene* MChiramal SMorris

DATE 08/21/2003 08/19/2003 08/26/2003 08/28/2003 OFFICE SC:OES:IROB:DIPM C:IROB:DIPM

NAME TReis WDBeckner

DATE 08/29/2003 08/29/2003

Attachment 1 LIST OF RECENTLY ISSUED

NRC INFORMATION NOTICES

_____________________________________________________________________________________

Information Date of

Notice No. Subject Issuance Issued to

_____________________________________________________________________________________

2003-13 Steam Generator Tube 08/28/2003 All holders of operating licenses

Degradation at Diablo Canyon for pressurized-water reactors

(PWRs), except those who have

permanently ceased operations

and have certified that fuel has

been permanently removed from

the reactor.

89-69, Sup 1 Shadow Corrosion Resulting in 08/25/2003 All holders of operating licenses

Fuel Channel Bowing for boiling water reactors (BWRs),

except those who have

permanently ceased operations

and have certified that fuel has

been permanently removed from

the reactor vessel.

2003-12 Problems Involved in 08/22/2003 All holders of 10 CFR Parts 32, Monitoring Dose to the Hands 33, and 35 licenses.

Resulting from the Handling of

Radiopharmaceuticals

2003-11 Leakage Found on Bottom- 08/13/2003 All holders of operating license or

Mounted Instrumentation construction permits for nuclear

Nozzles power reactors, except those that

have permanently ceased

operations and have certified that

fuel has been permanently

removed from the reactor.

2003-10 Criticality Monitoring System 08/04/2003 All U.S. Nuclear Regulatory

Degradation at BWX Commission (NRC) licensees

Technologies, Inc., Nuclear authorized to possess a critical

Products Division, Lynchburg, mass of special nuclear material.

VA

Note: NRC generic communications may be received in electronic format shortly after they are

issued by subscribing to the NRC listserver as follows:

To subscribe send an e-mail to <listproc@nrc.gov >, no subject, and the following

command in the message portion:

subscribe gc-nrr firstname lastname

______________________________________________________________________________________

OL = Operating License

CP = Construction Permit