Press Release-03-108, NRC Issues Information Notice on Potential of Nuclear Power Plant Network to Worm Infection

From kanterella
Revision as of 12:24, 25 March 2020 by StriderTol (talk | contribs) (StriderTol Bot insert)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search
Press Release-03-108: NRC Issues Information Notice on Potential of Nuclear Power Plant Network to Worm Infection
ML032450281
Person / Time
Site: Davis Besse Cleveland Electric icon.png
Issue date: 09/02/2003
From:
Office of Public Affairs
To:
References
FOIA/PA-2003-0399 Press Release-03-108
Download: ML032450281 (1)


Text

NRC NEWS U.S. NUCLEAR REGULATORY COMMISSION Office of Public Affairs Telephone: 301/415-8200 Washington, DC 20555-001 E-mail: opa@nrc.gov Web Site: http://www.nrc.gov/OPA No.03-108 September 2, 2003 NRC ISSUES INFORMATION NOTICE ON POTENTIAL OF NUCLEAR POWER PLANT NETWORK TO WORM INFECTION The Nuclear Regulatory Commission staff has issued an Information Notice to alert nuclear power plant operators to a potential vulnerability of their computer network server to infection by the Microsoft SQL Server worm.

The vulnerability was demonstrated by a January event at the shutdown Davis-Besse nuclear power plant. The worm infection increased data traffic in the sites network, resulting in the plants Safety Parameter Display System and plant process computer being unavailable for several hours.

Neither of those systems, however, affects the safe operation of a nuclear plant. NRC regulations require safety-related systems to be isolated or have send-only communication with other systems.

Public health and safety were never impacted during the incident.

FirstEnergy Nuclear, the licensee at Davis-Besse, investigated the incident and found a contractor established an unprotected computer connection to its corporate network, through which the worm reached the plant network. The investigation also found plant computer engineering personnel were unaware of a security patch that prevented the worm from working. Corrective actions include requiring documentation of all external connections to the internal network, installing an additional layer of security software, and ensuring computer personnel review new security patches and install them promptly.

Information Notice 2003-14, Potential of Plant Computer Network to Worm Infection, will be available electronically on the NRCs web site at this address:

http://www.nrc.gov/reading-rm/doc-collections/gen-comm/info-notices/2003/ .