Security researchers at WaterISAC have identified numerous Human-Machine Interfaces (HMIs) for water infrastructure systems in the United States that are accessible over the public internet without authentication. These interfaces control critical functions such as water flow, pump operations, and chemical dosing. In many cases, HMIs were configured with default settings, lacked proper firewall protection, and were indexed by search engines. The exposure allows unauthenticated users to view or potentially manipulate system operations. WaterISAC highlighted the risk of both accidental disruption and targeted cyberattacks that could compromise public safety and operational integrity of essential services.
Analysis by Our Experts:
The exposure of HMIs for U.S. water systems to the open internet without authentication represents a direct failure of basic cybersecurity hygiene. The use of default configurations and absence of network segmentation or firewall protection significantly increases the likelihood of unauthorized access. Public indexing of critical interfaces through search engines introduces avoidable risk and demonstrates a disregard for industry-standard ICS/SCADA security practices.
These systems control essential public services, and their unsecured deployment elevates the potential for disruption, whether accidental or deliberate.
Read the full article here.