ICS/OT

Critical Vulnerabilities Expose ​​Weintek HMIs to Attacks

Weintek has patched critical and high-severity vulnerabilities found in its cMT series HMIs by industrial cybersecurity firm TXOne. 

Weintek has patched critical and high-severity vulnerabilities found in its cMT series HMIs by industrial cybersecurity firm TXOne. 

The US cybersecurity agency CISA last week warned organizations about critical- and high-severity vulnerabilities discovered by researchers in a human-machine interface (HMI) product made by Taiwan-based Weintek.

According to CISA, the impacted product, the Weintek cMT HMI, is used worldwide, including in critical manufacturing organizations, which are considered part of critical infrastructure. The vendor has released patches for cMT3000-series, cMT-HDM, and cMT-FHD products.

A total of three vulnerabilities have been found in the HMI by industrial cybersecurity firm TXOne Networks. They can be exploited by anonymous users to bypass the authentication process or execute arbitrary commands after they log in to the targeted device.

“By combining [the vulnerabilities], a remote attacker may gain access to the system or remotely execute commands without authentication via the web server whose OS version is listed as affected,” Weintek said in its own advisory last week. 

Hank Chen, the TXOne Networks researcher credited for finding the vulnerabilities, told SecurityWeek that the flaws could allow an attacker to take complete control of an HMI. 

However, Chen noted that while an attacker does not require any special permissions to launch a DoS attack, executing arbitrary commands requires the HMI’s password. 

The researcher said there are some impacted Weintek HMIs that are directly exposed to the internet, but such instances are “quite limited”.

TXOne has published a blog post providing technical details for each of the vulnerabilities. 

Advertisement. Scroll to continue reading.

This is not the first time TXOne researchers have found vulnerabilities in Weintek products. Earlier this year, CISA informed organizations about several issues identified by TXOne in the Weincloud cloud-based HMI, which could allow an attacker to manipulate and damage industrial control systems (ICS), such as PLCs and field devices.

Learn More at SecurityWeek’s ICS Cyber Security Conference
The leading global conference series for Operations, Control Systems and OT/IT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

October 23-26, 2023 | Atlanta
www.icscybersecurityconference.com

Related: Vulnerabilities Can Allow Attackers to Remotely Gain Control of Weintek HMIs

Related: Unpatched Vulnerabilities Expose Yifan Industrial Routers to Attacks

Related: Milesight Industrial Router Vulnerability Possibly Exploited in Attacks

Related Content

ICS/OT

Several ICS vendors released advisories on Tuesday to inform customers about vulnerabilities found in their products. 

ICS/OT

Government agencies are sharing recommendations following attacks claimed by pro-Russian hacktivists on ICS/OT systems.

ICS/OT

An analysis conducted by Honeywell shows that much of the USB-borne malware targeting industrial organizations can still cause OT disruption.

ICS/OT

Palo Alto Networks firewall vulnerability CVE-2024-3400, exploited as a zero-day, impacts a Siemens industrial product.

Nation-State

Mandiant summarizes some of the latest operations of Russia’s notorious Sandworm group, which it now tracks as APT44.

ICS/OT

In the past week Rockwell Automation addressed 10 vulnerabilities found in its FactoryTalk, PowerFlex and Arena Simulation products.

Malware & Threats

A suspicious NuGet package likely targets developers working with technology from Chinese firm Bozhon.

ICS/OT

UK’s NCSC releases security guidance for OT organizations considering migrating their SCADA solutions to the cloud.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version