Learn about weaknesses in ICS systems related to Zone Boundary Failures, where repurposed network zone boundaries can lead to vulnerabilities crossing safety and security boundaries.
In the SEI ETF's "Categories of Security Vulnerabilities in ICS" published in March 2022, weaknesses in this particular category can be linked to the category called "Zone Boundary Failures." In an ICS system, vulnerabilities arise when network zone boundaries that were originally designed for safety or other purposes are repurposed for security, particularly when traffic crosses those boundaries. It should be noted that the members of this category include the recommendations pertaining to the "Nearest IT Neighbor" as mentioned in the report, along with suggestions made by the CWE team. It is important to consider that these relationships may be subject to change in upcoming versions of CWE.