WirelessHART Security Update

by | Feb 8, 2016 | Industrial IoT | 0 comments

In recent weeks, there have been third party reports regarding security vulnerabilities of WirelessHART® systems. Emerson’s security experts have investigated and evaluated these claims. There are no known instances of successful security breaches in a customer setting to date and Emerson is doing everything possible to ensure that this remains the case. The vulnerabilities involved individuals who had physical access to the systems and disassembled the transmitter, to extract memory contents with specialized tools, in order to look for encryption keys. These concerns do not apply to manufacturers and producers with proper physical and network security practices in place.

Emerson has always suggested that customers implement the following security best practices to mitigate any potential security risk associated with the WirelessHART systems:

  • Control physical access
  • Change join keys
  • Use an Access Control List

Emerson's Melissa Stiegler


I spoke with Emerson’s Melissa Stiegler, Senior Global Wireless Product Manager, and she emphasized that Emerson is committed to designing, delivering and maintaining robust and secure products. Protecting our products against security threats is a top priority and is why we have a dedicated security staff to continuously monitor, analyze and respond to any potential security issue and offer mitigations if and when necessary.

“We’re working with Emerson security experts, as well as engaging third party experts to help design and maintain the robust security of our products. Emerson is committed to reviewing threats as they become known, issuing notifications when necessary, and providing mitigations and solutions in a timely manner. We use opportunities like these to consistently deliver more secure products to our users,” said Melissa.

EMR WiHART and WiFi Security WPEmersonProcess-WSEGFor further information on ways to mitigate risks for wireless security, see our WirelessHART System Engineering Guide, an Emerson Wireless Security whitepaper.

Or, visit our Emerson wireless security webpage.

You can also connect and interact with other wireless security experts in the Wireless group in the Emerson Exchange 365 community.

For further questions, please contact Emerson at [email protected].

Popular Posts

Comments

Author

Follow Us

We invite you to follow us on Facebook, LinkedIn, Twitter and YouTube to stay up to date on the latest news, events and innovations that will help you face and solve your toughest challenges.

Do you want to reuse or translate content?

Just post a link to the entry and send us a quick note so we can share your work. Thank you very much.

Our Global Community

Emerson Exchange 365

The opinions expressed here are the personal opinions of the authors. Content published here is not read or approved by Emerson before it is posted and does not necessarily represent the views and opinions of Emerson.

PHP Code Snippets Powered By : XYZScripts.com