Posts

CNC program transfers with Windows 10

Last month Nucor, North America’s largest steel producer, acknowledged a cybersecurity incident involving unauthorized third-party access to certain IT systems, reported Reuters. As a precaution, Nucor temporarily halted production at multiple facilities while forensic teams and external cybersecurity experts investigated the breach and worked to contain its impact. Nucor’s incident is just one example of how cyber threats exploit aging digital infrastructure – and for many manufacturers, that infrastructure often includes Windows 10. But with Windows 10 reaching end of support on October 14, 2025, there is a deeper risk for shops that continue to rely on aging CNC infrastructure.

Aging CNC infrastructures impact cybersecurity and operational efficiency

This year, manufacturers that don’t upgrade their Windows 10 machines risk missing critical OS-level security updates and losing compatibility with third-party solutions.

The New Reality of Windows 10 End of Life on CNCs

This year Windows 10 will no longer receive critical OS-level security updates. While support for Microsoft 365 apps on Windows 10 has been extended until October 2028, it’s far from a solution for the shop floor. It still means legacy CNC systems and other production technologies running on Windows 10 will become more vulnerable, not less. Compounding the risk, third-party vendors are already phasing out software support, while next-generation manufacturing platforms – from IIoT to real-time analytics – require compatibility with newer operating systems like Windows 11 and Server 2022. The gap between resilient, future-ready IT strategies and older shop floor systems is widening. This blog post explores what manufacturers can, and must, do to close that gap before it spreads into a serious operational liability.

The USB Epidemic: When Compliance and Productivity Collide

For many manufacturers still operating CNC equipment running on Windows 2000, XP or early versions of Windows 10, network segmentation or USB-based file transfers have become the go-to workaround for such outdated systems. However, this tactic is increasingly risky.

CNC program transfers with Windows 10

Running USB-based CNC file transfers have become the go-to workaround using Windows 10 and other outdated systems. However, this tactic is increasingly risky, exposing manufacturers to ransomware events, CMMC noncompliance and operational inefficiencies.

According to Honeywell’s 2022 USB Threat Report, “52% of threats are specifically designed to utilize USB removable devices,” with the vast majority of those threats able to disrupt industrial systems. Pair these threat actors with unsupported software, says Virgina Tech associate professor Lee Vinsel in a recent BBC article, and “there are all kinds of opportunities for failure here, especially when…companies stop supporting old software. Cybersecurity is a huge worry around this issue.” The Department of Defense well understands this concern. Its Cybersecurity Maturity Model Certification (CMMC) 2.0 framework prohibits unmonitored file transfers and insecure endpoints – meaning non-compliance can result in disqualification from federal contracts.

Operational inefficiencies further intensify the risk. Poor CNC program version control and manual CNC program transfers can cost production hours and potentially lower quality output as a result of incorrect or outdated G-code files being loaded at the machine.

Closing the Gap

Rather than investing millions in full machine replacements, many manufacturers are turning to modern Distributed Numerical Control (DNC) systems to serve as their secure industrial network. Solutions like Predator Secure DNC offer targeted upgrades that align with industry compliance frameworks and cyber-hardening strategies. IT and operational leaders can isolate legacy equipment from domain threats, centralize logging across mixed-machine environments, like Fanuc, Okuma, Mazak and others, and meet NIST SP 800-171 encryption standards via FIPS 140-2 validated cryptography.

The Cost of Complacency

Doing nothing may be the most expensive option. The global average cost of a data breach soared to 4.88M, the highest total ever, according to a 2024 IBM report.

For a temporary and limited reprieve, Microsoft offers an Extended Security Updates (ESU) for Windows 10 that starts at $61 per device Year One, with pricing doubling every consecutive year for a maximum of three years after the end of support for Windows 10. Even so, there is no extended Microsoft ESU option after this time period.

Plotting Your Path

To mitigate the risk of your manufacturing operations, IT and operations should take the following steps to prepare for the end of Windows 10 support:

Windows End of Life on CNCs

  1. Conduct a CNC Operating System (OS) and network audit before Q3 2025, identifying all legacy systems still running Windows 10 or earlier.
  2. Prioritize upgrades for machines processing sensitive IP or DoD-controlled projects.
  3. Implement secure DNC options along with Microsoft’s ESU to support phased migrations and DNC retrofits while maintaining compliance and uptime.

Maximizing Grace Periods

Microsoft’s 365 extension for Windows 10 is not a pardon, it’s simply a grace period. Manufacturers who fail to act may find themselves next in line for a costly ransomware event or compliance failure.

Manufacturing integrator Shop Floor Automations (SFA) has worked with hundreds of manufacturers to navigate such transitions securely and efficiently. The path to a resilient, connected shop floor doesn’t begin with rip-and-replace – it starts with informed decisions and trusted partners.

To receive technical guidance for your manufacturing operations, contact the experts at SFA now.

DoD contract manufacturing

In an effort to ensure defense contractors are following best practices to protect sensitive data, Cybersecurity Maturity Model Certification Program (CMMC) rulemaking is inching closer and closer to finalization, with rules proposed by the U.S. Defense Department (DoD) on December 26, 2023. While these rules are published for comment, the codified version isn’t expected to change too drastically, however, DNC software upgrades may be something to consider, and Shop Floor Automations can help.

Townsend Bourne, partner at Sheppard Mullin, noted during an interview with Federal News Network. “Personally, I don’t know that we’re going to see significant changes from the proposed rule that came out at the end of December and the way the final rule is drafted,” said Bourne. “Most importantly, because DoD has been working on this program for so long, and I think they’re at the point where they think it’s pretty close to final.”

CMMC 2.0 Level 1 Sneak Preview

USB CNC program transfer cybersecurity

Transferring CNC programs via USB can not only require hefty management of manual user authorizations, device logs and documentation, but they can risk USB CNC program transfer attacks and noncompliance with CMMC 2.0.

The progression of this rulemaking process is quickly advancing the impact of CMMC 2.0 to manufacturers of all sizes, especially small-to-medium sized businesses (SMBs) that will need to carefully manage finite resources to absorb added costs, personnel and training to meet and maintain compliance.

One aspect of CMMC 2.0 that will deliver a layer of complexity is the proper storage and control of removable media, like USBs and CDs, which many defense contract manufacturers utilize today to transfer CNC programs, images and other Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) to and from computers and machines. Let’s review a few aspects of the Level 1 requirements clause of 52.204-21, Basic Safeguarding of Covered Contractor Information Systems, to illustrate some of the necessary steps to store and control sensitive data appropriately on these devices.

  • Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems).

There should be a clear set of procedures regarding who is permitted access to removable media, their accountabilities related to this access, and how often these procedures are reviewed, validated and updated. Programmers, engineers and others involved in the CNC program transfer process should have unique credentials and the correct identity or role-based permissions across devices and systems.

Credentials and keys should be properly managed and rotated to enhance the security of sensitive information. If you’re manually managing user security and authorization related to CNC program transfers via paper or spreadsheets, for example, it can be a time-consuming and involved endeavor that may be prone to errors and noncompliance.

  • Limit information system access to the types of transactions and functions that authorized users are permitted to execute.

It’s necessary to have documentation of the transactions roles and personnel who are authorized to execute, so that sensitive data is not processed by those lacking permissions to do so. But do you also have the safeguards to block unauthorized transactions and track those attempts? Again, a manual means to meet this requirement can not only be labor-intensive and riddled with inaccuracies, but near impossible for some DoD contract manufacturers with complex operations.

USB CNC program transfer attacks

  • Verify and control/limit connections to and use of external information systems.

Even limiting the use of removable media can still leave data susceptible, as USBs are re-gaining popularity in cyberattacks. Daniel Wiley, the head of threat management at Check Point, relayed an instance in which a power company employee received a sealed USB device from an Amazon package, complete with Amazon tape. “He thought his wife ordered it. So he opened it up, plugged it in. Everything else was a chain reaction. It was able to break in across their VPN. Let’s just say the power company was not in a good place.”

It is imperative for defense contractors to have the proper controls set up to protect your CUI against USB CNC program transfer attacks – but no controls will be completely failsafe.

Roll Credits

It’s estimated that a CMMC Level 1 self-assessment will cost a small entity about $6,000, according to DefenseScoop. For SMBs, this cost could be significantly more depending upon the existing IT infrastructure, processes and know-how of your staff.

An ideal DNC software, which is a system that leverages Industrial Internet of Things (IIoT) and connects your shop floor equipment on one network, could be hugely beneficial. An upgraded DNC system can reduce or eliminate manual user authorizations, device logs and documentation for more streamlined CMMC 2.0 compliance and the prevention of USB CNC program transfer attacks.

 

Not only does this allow for CMMC 2.0 compliance, but DNC software upgrades also can streamline your entire operation. For instance, with Predator DNC software, you can network all CNCs, EDMs, PLCs and robots with a singular DNC package. At Shop Floor Automations (SFA), we have been the top Predator reseller for 20 years, and we also are a top provider of proven software from Scytec and Ascendant Technologies.

 

The team at SFA can provide you with DNC solutions for any brand, connection type or age of CNC machine. Additionally, we offer hardware solutions that can revolutionize your shop floor. To learn more about our machine monitoring solutions or how DNC software can aid your CMMC 2.0 compliance, contact an SFA representative today.

Ethernet CNC connectivity

Over the years, Windows-based CNC machines, robots, CMMs, test stands and other manufacturing equipment have proven popular, largely due to their Ethernet-based networking using the corporate network. But as Windows operating systems (OS) reach the end of their lifecycle, Microsoft technical assistance, software updates or security fixes no longer become available. The options, then, for manufacturers needing Ethernet CNC file transfers and running CNCs with Windows 2000, 2003 or older OS are limited: upgrading to a newer Windows OS can be cost prohibitive and involve a lack of support from the equipment manufacturer; or there’s no upgrade path available, thereby necessitating that the whole machine be replaced. 

The IT Imperative

To protect manufacturers from security risks associated with OS lifecycle completions, IT departments have led the initiative to remove older Windows OSs from corporate domains and discontinue support, while eliminating the use of FTP or Windows shares on untrusted VLANs altogether. This movement often relegates manufacturing operations to isolate a PC from the corporate network and go back to manually loading files through portable media – which presents its own set of security risks. TechAdvisory.org reports that 25 percent of malware is spread today through USB devices. Even the United States Computer Emergency Readiness Team (US-CERT) recommends banning portable media devices from the workplace. And for manufacturers subject to CMMC 2.0, the continued use of removeable media devices may involve severe restrictions or nonacceptance altogether.

Manufacturers needing Ethernet CNC file transfers and running CNCs on older Windows operating systems have limited, cost-efficient options. 

All of this leads to a collision course of lost productivity for the shop floor and some major challenges for IT, as programmers struggle to minimize time spent physically transferring files to equipment and maintain accurate version control and IT strives to minimize risk. The good news is that there are other Ethernet CNC file transfer options available than the common scenario above.

Ethernet CNC file transfers

CNC machines running on outdated operating systems lead to a collision course of lost productivity for the shop floor, as programmers struggle to minimize time spent physically transferring files to equipment and maintain accurate version control, and some major challenges for IT as it strives to minimize risk.

Fortified Ethernet Connectivity

A modern DNC networking system, for one, allows manufacturers to still take advantage of Windows 95 and newer OS, Ethernet as well as your existing network infrastructure, all while removing them from your corporate domain and eliminating the use of FTP, unsecure USB, Windows Administrator access and more. This secure version of DNC software, like Predator Secure DNC software, still enables you to transfer your CNC programs, CNC variables, offsets, parameters, PLC registers and other production data to and from your manufacturing equipment – but adds a layer of security with automatic authentication, encryption and data compression.

Machine tools with an RS232 connection, or those with an option for it, can be connected to Predator Secure DNC to avoid connectivity risks. You’ll need knowledge of your CNC machine’s communication parameters, including baud rate, data bits, stop bits and parity settings or the network connection, such as FTP, FileShare, etc. Consult with an expert manufacturing integrator to explore any other prerequisites to connect your CNC machines through a next-generation DNC networking system.

An aerial view of the United States Pentagon.

Companies within the Defense Industrial Base (DIB), like machine, pharmaceutical and aerospace product manufacturers, are increasingly the subject of frequent attacks in pursuit of the billions of dollars tied up in Department of Defense (DoD) projects. The SolarWinds breach, the REvil cybergang hit on a defense contractor and others incidents making headline news are the overt evidence of these escalating targets – but it’s estimated by Black Kite that “twenty percent of America’s largest 100 defense contractors are highly susceptible to a ransomware attack.”

An aerial view of the United States Pentagon.

For manufacturers with FCI, compliance with the DoD’s CMMC 2.0 involves the control of removable media, such as PCMCIA memory cards and USB drives, and impacts the use of such media in conjunction with your CNC machinery.

The DoD is naturally taking action. The safeguard of defense-related information has been named a major priority, says the DoD, leading the agency to unveil its “enhanced” CMMC 2.0 program in November of last year. With three different levels of compliance (“Foundational,” “Advanced” and “Expert”), CMMC 2.0 will undergo implementation through the rulemaking process, which can span from nine months to two years, and then ultimately fold the program into a contractual requirement. This means that any company that processes, stores or handles Federal Contract Information (FCI) must perform a CMMC Level 1 self-assessment.

Proper Protection of CUI

For manufacturers with FCI, CMMC 2.0 compliance involves the control of removable media, such as PCMCIA memory cards and USB drives, and encrypting this media to properly protect Controlled Unclassified Information (CUI). The process of storing and transferring machine programs is already a time- and labor-consuming task: often companies set up a kiosk for programmers to peruse programs, copy the selected machine code onto a USB, trek back to the machinery and copy the program to the machine. One manufacturer estimated that it took them 10 minutes of set-up time to upload a program and get the routers – per part. The total time devoted to this process amounted to around 83 hours a month.

CNC machine programs with PCMCIA media cards and USB drives also make revision control virtually impossible. Programs that were never proven can be exported to machines, machined “not to spec” and lead to the scrapping of parts, rework, or worse, customer rejections. Companies can then find themselves scrambling to repair customer concerns and spending additional time and labor sourcing the correct program, and ultimately going through the machine program transfer process over again.

Now, with CMMC 2.0, machinery using removable storage devices can also lead to noncompliance. Solutions to achieve compliance, however, may hold even greater possible benefits for manufacturers.

DNC for Compliancy, Reliability, and Greater Productivity

A modern DNC networking solution, like Predator DNC as available through Shop Floor Automations, can work towards helping companies eliminate removable drives from CNC manufacturing equipment altogether. Serving as one industrial network for all your CNC machines, robots, CMMs, PLCs, 3D printers and other equipment, a well-designed DNC networking system ensures that only your latest files are tapped from their central location and, when changes occur, the edits are stored back on your file server.

A machinist working with a machine that is running DNC software, removing the need for physical drives and saving time between jobs.

A well-designed DNC networking solution can connect all your CNC machines, robots, CMMs, PLCs, 3D printers and other equipment on one industrial network, thereby removing or reducing the need for removable storage media, like PCMCIA media cards or USB drives.

Even more so, CNC program revisions can be controlled through a bar code or QR code reader to eliminate errors and transfer the proven/released part program every time into the CNC for complete traceability. Securing greater control of your CNC program revisions can lead to a reduction in the amount of rework and scrap that plagues companies utilizing untested programs. All in all, the implementation of a proper DNC networking solution can equate to a more productive team and a more consistent and reliable manufacturing process.

Set up your organization for CMMC 2.0 compliance while realizing significant gains in productivity and reliability – contact a DNC networking specialist at Shop Floor Automations to discuss your unique defense environment today.