Researchers recently announced vulnerabilities in SCADA OPC systems. SCADA refers to the computerized control over things from dams to oil refineries to rail roads to nuclear power plants. As I discussed in a presentation last year, SCADA is completely open to attack, especially OPC.
OPC is a standard for Microsoft Windows that makes it easy to write GUI applications for SCADA. They translate between Windows primitives such as MS-RPC/DCOM to backend protocols that actually do the monitoring and controlling of switches, valves, pressure gauges, thermometers, and so forth. These backend protocols are often based upon standards that pre-date Windows. They are horribly insecure because few people in the SCADA industry know what a "buffer-overflow" is.
Unfortunately, OPC is completely open to attack. The code is horribly insecure. It took me 5 minutes to find a remotely exploitable bug when I downloaded sample implementations from the OPC Foundation a couple years ago. The real problem is not vulnerabilities but authentication. OPC installations are normally run without needing a username or password, which means a hacker can control them without having to mess around with things like buffer overflows. Moreover, if proper authentication and encryption are enabled, then you can't actually remotely exploit them without first logging on. This is the case with the recent announcement from neutralbit: it's only exploitable if the user has login privileges.
Unfortunately, many SCADA organizations are not going to take neutralbit's work seriously for this reason. They know that since their systems are already wide open to attack, that patching them against this bug won't stop a hacker. That would be wrong. First, there is the possibility of worm exploiting these bugs. Second, at some point the SCADA industry is going to have to catch up with the rest of the world with regards to securing their products. Neutralbit has done an excellent job of explaining to you potential problems with OPC, but they've also explained them to hackers and cyber-terrorists. Any kid who wants to prove he's a vulnerability hunter now knows he can go onto eBay, get some cheap OPC products, find vulnerabilities in them, and announce them to the world. There is a good chance that many more OPC vulnerabilities will be announced and/or exploited in the next couple years.
Of course, it doesn't mean you should take down your SCADA network to patch your OPC systems immediately, but it does mean you need to be looking into the problem. For example, you should never buy a SCADA product without first asking the vendor for an independent vulnerability assessment from a third party (e.g. Errata Sec, Matasano, ISS/IBM, Neohapsis, neutralbit, etc.). Chances are good that if they can't give you an independent vulnerability assessment for their products, that they will have the easily discovered vulnerabilities like those that neutralbit is announcing.