Today the DHS NCCIC-ICS published two control system
security advisories for products from Phoenix Contact and Advantech.
Phoenix Contact Advisory
This advisory
describes six vulnerabilities in the Phoenix Contact FL SWITCH. The
vulnerabilities were reported by Evgeniy Druzhinin, Ilya Karpov, and Georgy
Zaytsev of Positive Technologies via CERT@VDE. Phoenix Contact reports that
newer firmware versions mitigate the vulnerability. There is no indication that
the researchers have been provided an opportunity to verify the efficacy of the
fix.
The six reported vulnerabilities are:
• Cross-site request forgery - CVE-2018-13993;
• Improper restriction of excessive
authentication attempts - CVE-2018-13990;
• Cleartext transmission of
sensitive information - CVE-2018-13992;
• Resource exhaustion - CVE-2018-13994;
• Insecure storage of sensitive
information - CVE-2018-13991; and
• Memory corruption - CVE-2017-3735
NCCIC-ICS reports that a relatively low-skilled attacker
could remotely exploit these vulnerabilities to allow attackers to have user
privileges, gain access to the switch, read user credentials, deny access to
the switch, or perform man-in-the-middle attacks.
NOTE: The CERT@VDE advisory notes
that CVE-2018-13992 has not been fixed in the newer firmware versions available.
A generic fix for that vulnerability has been recommended.
Advantech Advisory
This advisory
describes three vulnerabilities in the Advantech WebAccess/SCADA platform.
The vulnerabilities were reported by Devesh Logendran of
Attila Cybertech. Advantech has a new version that mitigates the
vulnerabilities. There is no indication that Logendran has been provided an
opportunity to verify the efficacy of the fix.
The three reported vulnerabilities are:
• Improper authentication - CVE-2019-6519:
• Authentication bypass using an
alternate path or channel - CVE-2019-6521; and
• SQL injection - CVE-2019-6523
NCCIC-ICS reports that a relatively low-skilled attacker
could remotely exploit these vulnerabilities to allow an attacker to access and
manipulate sensitive data.
No comments:
Post a Comment