Today CISA’s NCCIC-ICS published two control system security advisories for products from Rockwell and multiple embedded TCP/IP stacks.
Rockwell Advisory
This advisory describes an uncontrolled search path element vulnerability in the Rockwell DriveTools SP and Drives AOP. The vulnerability was reported by Claroty and Cognite, Rockwell has an update that mitigates the vulnerability. There is no indication that the researchers have been provided an opportunity to verify the efficacy of the fix.
NCCIC-ICS reports that an uncharacterized attacker with local access could exploit the vulnerability resulting in privilege escalation and complete control of the system.
TCP/IP Stacks Advisory
This advisory describes nine separate use of insufficiently random values vulnerabilities in multiple open-source and proprietary TCP/IP stacks. The vulnerabilities (nicknamed NUMBER:JACK) were reported by Daniel dos Santos, Stanislav Dashevskyi, Jos Wetzels, and Amine Amri of Forescout Research Labs. Some the affected vendors have new versions that mitigate the vulnerability in their TCP/IP stack.
The nine reported CVE’s (each generally associated with a separate TCP/IP stack vendor) are:
• CVE-2020-27213 - Nut/Net 5.1 - Patch
in progress
• CVE-2020-27630 - uC/TCP-IP 3.6.0 -
Patched in the latest version of Micrium OS (successor project),
• CVE-2020-27631 - CycloneTCP 1.9.6
- Patched in version 2.0.0,
• CVE-2020-27632 - NDKTCPIP 2.25 -
Patched in version 7.02 of Processor SDK,
• CVE-2020-27633 - FNET 4.6.3 - Documentation
updated to warn users and recommend implementing their own PRNG [pseudorandom
number generator],
• CVE-2020-27634 - uIP 1.0
Contiki-OS 3.0 Contiki-NG 4.5 - No response from maintainers,
• CVE-2020-27635 - PicoTCP 1.7.0
PicoTCP-NG - Version 2.1 removes the default (vulnerable) implementation and
recommends users implement their own PRNG,
• CVE-2020-27636 - MPLAB Net 3.6.-
Patched in version 3.6.4.
• CVE-2020-28388 Nucleus NET 4.3 -Patched in Nucleus NET 5.2 and Nucleus ReadyStart v2012.12.
NCCIC-ICS reports that a relatively low-skilled attacker could remotely exploit the vulnerability to hijack or spoof TCP connections, cause denial-of-service conditions, inject malicious data, or bypass authentication.
NOTE: The “NUMBER:JACK” report explains that “Forescout Research Labs has released an open source script that uses active fingerprinting to detect which stack a target device is running.” {pg 6}.
Commentary: Oh this is going to be a fun one. I foresee lots of equipment vendor advisories in the works as everyone scrambles to try to fix this mess. BTW, the Report notes that an attack on this type of vulnerability in the old IT world was known as a Mitnick Attack.
CodeMeter Update
This update
provides new information on an advisory that was
originally published on September 8th, 2020 and most
recently updated on December 3rd, 2020. The new information
includes adding links to the vendor alert from Drager.
No comments:
Post a Comment