Yesterday the DHS NCCIC-ICS (okay, I finally gave in;
ICS-CERT is gone; please clean up the web site) published four control system
security advisories for products from Delta Electronics, Fuji Electric (2) and
Emerson.
Delta Advisory
This advisory
describes an out-of-bounds read vulnerability in the Delta Industrial
Automation PMSoft software development tool. The vulnerability was reported by Mat
Powell via ZDI. Delta has an update available that mitigates the vulnerability.
There is no indication that Powell has been provided an opportunity to verify
the efficacy of the fix.
NCCIC-ICS reports that a relatively low-skilled attacker
could remotely exploit this vulnerability to allow an attacker to read
confidential information.
FRENIC Advisory
This advisory
describes three vulnerabilities in the Fuji FRENIC HVAC drive devices. The vulnerability
was reported by Michael Flanders and Ghirmay Desta via ZDI. Fuji is working on
mitigation measures.
The three reported vulnerabilities are:
• Buffer over-read - CVE-2018-14790;
• Out-of-bounds read - CVE-2018-14798; and
•
Stack-based buffer overflow - CVE-2018-14802
NCCIC-ICS reports that a relatively low-skilled attacker
could remotely exploit these vulnerabilities to allow for arbitrary remote code
execution affecting the availability of the device.
Alpha5 Advisory
This advisory
describes two buffer-overflow vulnerabilities in the Fuji Alpha5 Smart Loader
servo drive. The vulnerability was reported by Michael Flanders via ZDI. Fuji
is working on mitigation measures.
The two reported vulnerabilities are:
• Classic buffer overflow - CVE-2018-14788;
and
• Heap-based buffer overflow - CVE-2018-14794
NCCIC-ICS reports that a relatively low-skilled attacker
could remotely use publicly available exploits to allow for arbitrary remote
code execution on the device.
NOTE: It is disappointing that Fuji was not even able to
provide workaround security measures for these two product lines. Does anyone
know if NCCIC-ICS is still giving the 45-day grace period before publishing
their advisories?
Emerson Advisory
This advisory
describes two vulnerabilities in the Emerson AMS Device Manager. The
vulnerabilities were reported by Sergey Temnikov of Kaspersky Lab and Emerson. Emerson
has patches available to mitigate the vulnerabilities. There is no indication
that Temnikov has been provided an opportunity to verify the efficacy of the
fix.
The two reported vulnerabilities are:
• Improper access control - CVE-2018-14804;
and
• Improper privilege management - CVE-2018-14808
NCCIC-ICS reports that a relatively low-skilled attacker
could remotely exploit these vulnerabilities to
No comments:
Post a Comment