Today the DHS NCCIC published four control system security
advisories for products from Rockwell Automation, Horner Automation, Delta
Industrial and Intel.
Rockwell Advisory
This advisory
describes two vulnerabilities in the Rockwell Allen-Bradley PowerMonitor 1000. This
vulnerability was reported by Luca Chiou of ACSI. Rockwell is working on
mitigation measures. CheckPoint Software Technologies has
released IPS rules to detect attempts to exploit CVE-2019-19615.
The two reported vulnerabilities are:
• Cross-site scripting - CVE-2019-19615;
and
• Authentication bypass using alternate path or channel
- CVE-2019-19616
NCCIC-ICS reports that a relatively low-skilled attacker
could use a publicly available exploits (here
and
here) to remotely exploit these vulnerabilities to allow a remote
attacker to affect the confidentiality, integrity, and availability of the
device.
NOTE: I discussed
these vulnerabilities last Saturday.
Horner Advisory
This advisory
describes an improper input validation vulnerability in the Horner Cscape
control system application programming software. The vulnerability was reported
by ‘anonymous’ via the Zero Day Initiative (ZDI). Horner has a new version that
mitigates the vulnerability. There is no indication that anonymous has been
provided an opportunity to verify the efficacy of the fix.
NCCIC-ICS reports that a relatively low-skilled attacker
with uncharacterized access could exploit the vulnerability to crash the device
being accessed, which may allow the attacker to read confidential information
and remotely execute arbitrary code.
Delta Advisory
This advisory
describes an out-of-bounds read vulnerability in the Delta Industrial
Automation CNCSoft. The vulnerability was reported by Natnael Samson
(@NattiSamson) via ZDI. Delta has an updated version that mitigates the
vulnerability. There is no indication that Samson was provided an opportunity
to verify the efficacy of the fix.
NCCIC-ICS reports that a relatively low-skilled attacker
with uncharacterized access could exploit the vulnerability to cause a buffer
overflow condition that may allow information disclosure or crash the
application.
Intel Advisory
This advisory
describes eleven vulnerabilities in the Intel Data Center Manager SDK. The vulnerability
was reported by Intel’s Product Security Incident Response Team. Intel has a
new version that mitigates the vulnerability.
The eleven reported vulnerabilities are:
• Improper authentication - CVE-2019-0102;
• Protection mechanism failure (4)
- CVE-2019-0103, CVE-2019-0104, CVE-2019-0106, and CVE-2019-0107,
• Permission issues (4) - CVE-2019-0105,
CVE-2019-0108, CVE-2019-0109, and CVE-2019-0111;
• Key management issues - CVE-2019-0110;
• Insufficient control flow
management - CVE-2019-0112
NCCIC-ICS reports that a relatively low-skilled attacker could
remotely exploit the vulnerability to allow escalation of privilege, denial of
service, or information disclosure.
No comments:
Post a Comment