9.3.1 Bypassing safety systems

2025.10.06.
AI Security Blog

The invisible logic that keeps a one-ton industrial robot from causing catastrophic harm is often more fragile than the physical cage surrounding it. In industrial robotics, safety isn’t just a feature; it’s a complex, multi-layered system mandated by standards like ISO 10218. As a red teamer, your objective is to understand these layers—physical, logical, and increasingly, perceptual—and identify the seams where they can be pried apart.

The Anatomy of an Industrial Robot Safety System

Before you can bypass a system, you must understand its architecture. Modern industrial robot cells integrate several types of safety mechanisms, creating a defense-in-depth structure. A failure in one system should, in theory, be caught by another. Your goal is to create a cascading failure.

Kapcsolati űrlap - EN

Do you have a question about AI Security? Reach out to us here:

Robot Work Cell Robot Safety PLC Light Curtain STOP E-Stop Input Signal Safe Torque Off (STO)

Figure 1: Key components of a typical industrial robot safety system. The Safety PLC is the central nervous system.

The Hierarchy of Control

  1. Physical Barriers: Fences, enclosures, and mechanical stops. These are the most basic and robust controls, but they offer no protection when maintenance requires human entry.
  2. Presence Sensing Devices: Light curtains, laser scanners, and pressure-sensitive mats. These devices detect human presence in a hazardous area and send a signal to the safety controller.
  3. Dedicated Safety Controller (Safety PLC): This is the brain of the safety system. It’s a specialized, often redundant controller that processes inputs from safety devices and executes safety-rated logic (e.g., “IF light curtain is broken, THEN trigger Safe Torque Off”).
  4. Software and Logic-Defined Zones: Modern systems define “soft” safety zones in software. The robot controller continuously tracks the arm’s position and reduces speed or stops if it approaches a restricted virtual boundary.

Attack Vectors and Bypass Techniques

Your attack will likely target the communication and logic layers, as physically tampering with hardware is often too overt for a red team engagement. The goal is to make the system believe everything is normal while you gain control or create an unsafe condition.

1. Spoofing Presence Sensing Inputs

Presence sensors like light curtains typically use simple binary signals (e.g., OSSD – Output Signal Switching Device) to communicate their state: clear or interrupted. If you can gain access to the wiring or the I/O block connected to the Safety PLC, you can manipulate these signals.

  • Signal Replay Attack: Record the “clear” signal from the sensor. Then, physically block the sensor and replay the recorded signal to the Safety PLC. The PLC continues to believe the area is safe, allowing the robot to operate with a human inside the cell.
  • Voltage Injection: For simpler, non-pulsed sensors, you may be able to directly apply the expected “safe” voltage to the PLC input terminal, effectively overriding the actual sensor state. This requires physical access to terminals but is a highly effective, low-tech bypass.

2. Manipulating the Safety PLC Logic

The Safety PLC is the crown jewel. Gaining control here means you control the entire safety apparatus. These devices are hardened but not impenetrable, especially if you can access their programming or configuration interface, often over Ethernet.

  • Unauthorized Logic Upload: Safety PLCs require specialized software for programming (e.g., Siemens TIA Portal, Rockwell Studio 5000). If you can compromise an engineer’s workstation or gain network access to the PLC, you can upload a modified safety program. The most subtle change is to simply comment out or disable a single safety check.
  • Forcing I/O in Debug Mode: Many PLCs have a “force” function used for debugging, allowing an operator to manually set the state of an input or output, overriding its physical state. If you can enable this mode (often protected by a weak password or physical key switch), you can force the input from a light curtain to “true” (safe) even when it’s physically false (interrupted).
// Simplified Safety PLC Logic (Ladder Logic Pseudocode)

// -- Rung 1: Check for unsafe conditions --
IF LightCurtain_Input = FALSE OR E_Stop_Pressed = TRUE THEN
    SET Unsafe_Condition_Flag = TRUE;
END_IF;

// -- Rung 2: Control robot power based on safety status --
// Your target is to prevent Unsafe_Condition_Flag from ever being TRUE.
IF Unsafe_Condition_Flag = FALSE AND System_Enabled = TRUE THEN
    ENABLE Robot_Power_Output;
ELSE
    DISABLE Robot_Power_Output; // Triggers Safe Torque Off (STO)
END_IF;
            

In the example above, a successful bypass could involve forcing LightCurtain_Input to a constant TRUE state within the PLC’s memory, rendering the first rung of logic ineffective.

3. Exploiting Software-Defined Safety Zones

Modern robots rely heavily on software for safety. This introduces a larger, more complex attack surface compared to hardwired relays.

  • Parameter Tampering: Safety configurations, including the coordinates of virtual safety fences (e.g., FANUC’s Dual Check Safety or KUKA’s SafeOperation), are stored as parameters. Accessing the robot controller with sufficient privileges allows you to modify these parameters, effectively shrinking or eliminating a safety zone. The robot’s own internal model becomes a lie.
  • Encoder/Resolver Signal Manipulation: The robot knows its position via encoders on each joint. By intercepting and modifying the signals from these encoders (a Man-in-the-Middle attack on the internal bus), you can trick the safety controller into thinking the robot arm is somewhere it isn’t. This could allow the robot to move outside its configured safe operating envelope without triggering an alarm.
Safety System Type Primary Function Common Bypass Vector Required Access Level
Physical Fencing Prevent physical entry Tampering with interlock switches on gates Physical
Light Curtain / Laser Scanner Detect presence in a 2D plane Signal replay or forcing PLC input Physical (wiring) or Network (PLC)
Safety PLC Execute safety logic Unauthorized code upload; forcing I/O Network (Engineering access)
Software Safety Zones Enforce virtual boundaries Parameter manipulation; configuration file modification Network (Administrator access)
Force/Torque Sensors (Cobots) Detect unexpected collisions Sensor calibration data poisoning; signal filtering Network (Advanced access)

Red Team Engagement Strategy

A systematic approach is critical. Don’t just look for an open port; understand the system as a whole.

  1. Reconnaissance: Gather documentation. Find the electrical schematics, the safety PLC program, and the robot’s safety configuration files. Identify the make and model of the Safety PLC and the robot controller. These are your primary targets.
  2. Network Mapping: Industrial networks are often flat. Scan for the IP addresses of the robot controller and the Safety PLC. Identify the protocols they use (e.g., PROFINET, EtherNet/IP). Are the programming ports accessible?
  3. Vulnerability Analysis: Are the controllers using default credentials? Is the firmware outdated? Can you find public exploits for the PLC or robot controller software?
  4. Exploitation: Begin with the least invasive techniques. Attempt to access the PLC or robot controller with default passwords. If that fails, escalate to targeted attacks against the protocols or firmware. Your goal is to gain the ability to either modify logic/parameters or force I/O states.
  5. Demonstrate Impact: The final step is to create a controlled but clear demonstration of the bypass. For example, use the force function to keep a safety input “on” while a laser pointer is used to break a light curtain, showing the robot fails to stop. Never perform a test that creates a genuine physical hazard. The goal is to prove the vulnerability, not cause an accident.

Bypassing industrial safety systems is a high-stakes endeavor. Success is not just about technical skill but also about a deep understanding of the operational technology and a disciplined, safety-conscious methodology.