ICS-CERT: xArrow SCADA HMI Multiple Vulnerabilities

Wednesday, March 07, 2012

Infosec Island Admin

7fef78c47060974e0b8392e305f0daf0

ICS-CERT is aware of a public report detailing multiple vulnerabilities with proof-of-concept (PoC) exploit code affecting xArrow, a supervisory control and data acquisition/human-machine interface (SCADA/HMI) product.

According to this report, these vulnerabilities are remotely exploitable. This report was released by independent security researcher Luigi Auriemma without coordination with either the vendor, ICS-CERT, or any other coordination entity that ICS-CERT is aware of.

ICS-CERT has coordinated this report with vendor in order to confirm the vulnerabilities and identify mitigations. ICS-CERT is issuing this alert to provide early notice of the report and identify baseline mitigations for reducing risks to these and other cybersecurity attacks.

The report included vulnerability details and PoC exploit code for the following vulnerabilities:

Vulnerability Type:  Decompression NULL Pointer
Exploitability:  Remote
Impact:  Denial of Service

Vulnerability Type:  Heap Corruption
Exploitability:  Remote
Impact:  Denial of Service/Possible Arbitrary Code Execution

Vulnerability Type:  Invalid Read Access
Exploitability:  Remote
Impact:  Denial of Service

Vulnerability Type:  Memory Corruption
Exploitability:  Remote
Impact:  Denial of Service

MITIGATION

ICS-CERT is currently coordinating with the vendor and security researcher to identify mitigations. Please report any issues affecting control systems in critical infrastructure environments to ICS-CERT.

The full ICS-CERT advisory can be found here:

Source:  http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-12-065-01.pdf

Possibly Related Articles:
10626
SCADA
Industrial Control Systems
Denial of Service SCADA Vulnerabilities Remote Access Exploits ICS ICS-CERT Industrial Control Systems HMI xArrow
Post Rating I Like this!
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.