Tuesday, March 1, 2016

ICS-CERT Publishes Two Advisories

This morning the DHS ICS-CERT published two advisories for control system vulnerabilities in systems from Rockwell and Schneider.

Rockwell Advisory


This advisory describes a cross-site scripting vulnerability in the Rockwell Automation CompactLogix application that was first reported in an ICS-CERT Alert last August (and updated here). The vulnerability was reported by Aditya Sood. Rockwell has produced a firmware update to mitigate the vulnerability. There is no indication that Sood was provided an opportunity to verify the efficacy of the fix.

ICS-CERT reports that a relatively unskilled attacker could remotely exploit this vulnerability to deliver an attack to the connected web browser and thus affect availability.

Schneider Advisory

 

This advisory describes an OS command injection vulnerability in the Schneider StruxureWare Building Operations software. The vulnerability was reported by Karn Ganeshen. Schneider has produced a new version that mitigates the vulnerability. There is no indication that Ganeshen has been provided the opportunity to verify the efficacy of the fix. The Schneider Security Notification also reports a weak credential management vulnerability addressed by the same “Automation Server firmware” update that addresses the command injection vulnerability.

ICS-CERT reports that a relatively unskilled attacker who was an authenticated user could remotely exploit this vulnerability to circumvent access controls.

NOTE: Ran across an interesting blog post by Karn Ganeshen while researching for this post. See also ICSA-12-249-02 for a similar vulnerability reported a while back.

1 comment:

Anonymous said...

Schneider details have been posted:
http://ipositivesecurity.blogspot.in/2016/03/schneider-electric-vulnerabilities.html

 
/* Use this with templates/template-twocol.html */