Today he CISA NCCIC-ICS published a control system security
advisory for products from Schneider
Schneider Advisory
This advisory
describes three vulnerabilities in the Schneider ProClima building and
automation control products. The vulnerabilities were reported by Haojun Hou, Kushal
Arvind Shah, Fortinet, Yongjun Liu, NSFOCUS, and Telus. Schneider has released
a new version that mitigates the vulnerabilities. There is no indication that
the researchers have been provided an opportunity to verify the efficacy of the
fix.
The three reported vulnerabilities are:
• Code injection - CVE-2019-6823;
• Improper restriction of operations within the
bounds of a memory buffer - CVE-2019-6824; and
• Uncontrolled search path element - CVE-2019-6825
NCCIC-ICS reported that a relatively low-skilled attacker
could remotely exploit these vulnerabilities to allow an unauthenticated,
remote attacker to execute arbitrary code on the targeted system.
NOTE: According to the Schneider
advisory these vulnerabilities were reported on June 11th, and I
briefly reported on them on June 15th. What NCCIC-ICS is actually
addressing is an update to the original advisory that adjusted the CVSS Base
Score and Vector for CVE2019-6823 and CVE-2019-6824.
No comments:
Post a Comment