Yesterday DHS ICS-CERT published an alert for the Sielco
Sistemi WinLog Lite SCADA product. The alert was based upon an uncoordinated
disclosure (with proof of concept code) from FaryadR (a.k.a. Ciph3r) for a
structured exception handler vulnerability.
NOTE: ICS-CERT provided the link to
the FaryadR disclosure in their alert; I wish they would get consistent with
their acknowledgement of the source of disclosures. I strongly vote for their
continuing to provide links to the actual disclosures.
According to the alert this vulnerability would allow an
attacker with physical access to the system to execute arbitrary code. The
WinLog Lite product is mainly a demo product for sales purposes, but it can be
used to write small (limit of 24 tags) SCADA applications so this is a real
vulnerability but not an earth-shaking, critical-infrastructure vulnerability.
The exploit code does seem to be a little on the complex
side for such a minor system. I’m wondering if FaryadR is working on a similar
exploit of the WinLog Pro product. That would make this disclosure a friendly
warning.
No comments:
Post a Comment