[ICS] SpiderControl SCADA Web Server – Directory Traversal Vulnerability

Vendor: SpiderControl
Equipment: SCADA Web Server
Vulnerability: Directory Traversal

ICS-CERT Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-17-234-03

ZDI Advisory:
http://www.zerodayinitiative.com/advisories/ZDI-17-695

CVE-ID
CVE-2017-12694

AFFECTED PRODUCTS
The following versions of SpiderControl SCADA Web Server, a software management platform, are affected:

  • SCADA Web Server < version 2.02.0100


IMPACT

Successful exploitation of this vulnerability allows an attacker to gain read access to system files through directory traversal.

Read on for details.

read more

[ICS] Schneider Electric Trio TView – vulnerable JRE versions in use

Vendor: Schneider Electric
Equipment: Trio TView
Vulnerabilities: Multiple Vulnerabilities for Java Runtime Environment

ICS-CERT Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-17-213-02

Schneider Electric Advisory
http://www.schneider-electric.com/en/download/document/SEVD-2017-199-01/

AFFECTED PRODUCTS


The following versions of Schneider Electric Trio TView, a management and diagnostics software, are affected:

  • Trio TView Software, TBUMPROG-TVIEW, Version 3.27.0 and prior.

Fixed in TView Version 3.29.0.

IMPACT
Exploitation of these vulnerabilities may allow a remote attacker to compromise the Trio TView Management Suite.

Read on for details.

read more

[ICS] Moxa SoftNVR-IA Live Viewer – Insecure Library Loading Allows Code Execution

Vendor: Moxa
Equipment: SoftNVR-IA Live Viewer
Vulnerability: Uncontrolled Search Path Element

ICS-CERT Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-17-220-02

CVE-ID
CVE-2017-5170

AFFECTED PRODUCTS
The following versions of SoftNVR-IA Live Viewer, a video surveillance software designed for industrial automation systems, are affected:

  • SoftNVR-IA Live Viewer, Version 3.30.3122 and prior versions

IMPACT
Successful exploitation of this vulnerability may allow an attacker to execute code from a malicious DLL on the affected system with the same privileges as the user running the program.

Read on for details.

read more

[ICS] SpiderControl SCADA MicroBrowser – Stack Buffer Overflow

Vendor: SpiderControl
Equipment: SCADA MicroBrowser
Vulnerability: Stack-based Buffer Overflow

ICS-CERT Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-17-234-02

ZDI Advisory
http://www.zerodayinitiative.com/advisories/ZDI-17-694/

CVE-ID
CVE-2017-12707

AFFECTED PRODUCTS
The following versions of SCADA MicroBrowser, a software management platform, are affected:

  • SCADA MicroBrowser Versions 1.6.30.144 and prior.

IMPACT

Successful exploitation of this vulnerability could allow an attacker to gain access to the system, manipulate system files, and potentially render the system unavailable.

Read on for details.

read more

[ICS] Solar Controls WATTConfig M Software – Insecure Library Loading Allows Code Execution

Vendor: Solar Controls
Equipment: WATTConfig M Software
Vulnerability: Uncontrolled Search Path Element

ICS-CERT Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-17-222-03

CVE-ID
CVE-2017-9648

AFFECTED PRODUCTS
The following versions of Solar Controls’ WATTConfig M Software for Windows 2.5.10 for M SSR/MAX PLCs are affected:

  • WATTConfig M Software, Version 2.5.10.1 and prior.

IMPACT
Successful exploitation of this vulnerability may allow arbitrary code execution.

Read on for details.

read more

[ICS] SIMPlight SCADA software – Insecure Library Loading Allows Code Execution

Vendor: SIMPlight
Equipment: SCADA Software
Vulnerability: Uncontrolled Search Path Element

ICS-CERT Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-17-222-01

CVE-ID
CVE-2017-9661

AFFECTED PRODUCTS
The following versions of SIMPlight SCADA software, software for building management systems and automated facilities, are affected:

  • SCADA Software version 4.3.0.27 and prior.

IMPACT
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code.

Read on for details.

read more

[ICS] AzeoTech DAQFactory – Insecure Default Permissions and Insecure Library Loading Allows Code Execution

Vendor: AzeoTech
Equipment: DAQFactory
Vulnerability: Weak Permissions, Uncontrolled Search Path Element

ICS-CERT Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-17-241-01

CVE-IDs
CVE-2017-5147
CVE-2017-12699

AFFECTED PRODUCTS
The following versions are affected:

  • DAQFactory versions prior to 17.1

IMPACT
Successful exploitation of these vulnerabilities could allow authenticated local users to escalate their privileges and execute arbitrary code.

Read on for details.

read more

[ICS] Solar Controls Heating Control Downloader – Insecure Library Loading Allows Code Execution

Vendor: Solar Controls
Equipment: Heating Control Downloader (HCDownloader)
Vulnerability: Uncontrolled Search Path Element

ICS-CERT Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-17-222-02

CVE-ID
CVE-2017-9646

AFFECTED PRODUCTS
The following versions of Solar Controls’ Heating Control Downloader (HCDownloader) are affected:

  • HCDownloader, Version 1.0.1.15 and prior.

IMPACT
Successful exploitation of this vulnerability may allow arbitrary code execution.

Read on for details.

read more

[ICS] Cambium ePMP ICS-CERT Advisory Published

Back in April 2017, I posted SNMP vulnerabilities in Cambium ePMP devices.

ICS-CERT has now published the advisory for Cambium ePMP SNMP vulnerabilities: https://ics-cert.us-cert.gov/advisories/ICSA-17-166-01

Vendor: Cambium Networks
Equipment: ePMP
Vulnerabilities: Improper Access Control, Improper Privilege Management

CVE-IDs
CVE-2017-7918
CVE-2017-7922

Cambium ePMP product security, putting it mildly, needs considerable improvement. I will be publishing another set of fresh reports on Cambium devices soon. In case you are using ePMP boxes, or other Cambium appliances, please ensure:

1. your devices are not accessible publicly
2. default account passwords & SNMP community strings are changed to strong values
3. SNMP is filtered at the firewall.

Read on for details.

read more

[ICS] Satel Iberia SenNet Data Logger and Electricity Meters Command Injection – Metasploit Exploit Module

Metasploit Exploit Module published - Satel Iberia SenNet Data Logger and Electricity Meters Command Injection

This module exploits an OS Command Injection vulnerability in Satel Iberia SenNet Data Loggers & Electricity Meters to perform arbitrary command execution as 'root'.

Exploit URL:
https://www.rapid7.com/db/modules/auxiliary/scanner/telnet/satel_cmd_exec

Read on for demo.

read more