General corrective measures
- Since the vulnerabilities are present in the TCP/IP stack, an active network connection is required to be able to manipulate the devices. Therefore, the risk of an attack can be minimized by restricting the network access to the devices.
- Unless absolutely necessary, devices/systems should be disconnected from the higher-level network.
- Prevent unauthorized people or devices from gaining access to affected devices and network segments in which affected devices are being operated.
- When accessing these devices with a laptop, the laptops should ideally not be connected to the network. Rather, a point-to-point Ethernet connection is preferable, if possible (e.g. the engineering interface of the MOVIPRO® SDC/ADC).
Additional information