ICS/OT

Researchers Detail Critical Vulnerabilities in SCADA Product

Two security researchers uncovered vulnerabilities affecting a SCADA product that can be potentially used to compromise operations at critical infrastructure companies.

<p><span><strong><span>Two security researchers uncovered vulnerabilities affecting a SCADA product that can be potentially used to compromise operations at critical infrastructure companies.</span></strong></span></p>

Two security researchers uncovered vulnerabilities affecting a SCADA product that can be potentially used to compromise operations at critical infrastructure companies.

The findings were discussed March 8 at the RootedCon security event by Juan Vazquez of Rapid7 and Julian Vilas of Scytl. The subject of the talk was vulnerabilities in the Yokogawa CENTUM CS3000 product.

According to an advisory from the company, a computer where the CENTUM CS 3000 integrated production control system is installed may have three vulnerabilities that cause a buffer overflow. The vulnerabilities were found in version R3.08.50, and have been patched by the company.

“These are about as critical as you can measure,” said Tod Beardsley, Engineering Manager at Rapid7. “[The researchers] have disclosed discovered vulnerabilities that can both cause a remote denial of service on the affected HIS (human interface system) component as well as a remote code execution vulnerability that would allow an attacker to run arbitrary commands on the HIS. From there, an attacker can effectively control industrial systems with the same rights as an authorized operator.”

The vulnerabilities are described below by Vazquez:

R7-2013-19.1 – BKCLogSvr.exe Heap Based Buffer Overflow: The “BKCLogSvr.exe” service, started automatically with the system, listens by default on UDP/52302. By sending a specially sequence of packets to UDP/52302 it’s possible to trigger a heap based buffer overflow, after an usage of uninitialized data, which allows to DoS the “BKCLogSvr.exe”, and on last instance, could allow execution of arbitrary code with SYSTEM privileges.

R7-2013-19.3 – BKHOdeq.exe Stack Based Buffer Overflow: The “BKHOdeq.exe” service, started when running the “FCS / Test Function” listens by default on TCP/20109, TCP/20171 and UDP/1240. By sending a specially crafted packet to the port TCP/20171 it’s possible to trigger a stack based buffer overflow which allows execution of arbitrary code with the privileges of the CENTUM user.

R7-2013-19.4 – BKBCopyD.exe Stack Based Buffer Overflow: The Yokogawa Centum CS3000 solution uses different services in order to provide all its functionality. The “BKBCopyD.exe” service, started when running the “FCS / Test Function”, listens by default on TCP/20111. By sending a specially crafted packet to the port TCP/20111 it’s possible to trigger a stack based buffer overflow which allows execution of arbitrary code with the privileges of the CENTUM user.

Advertisement. Scroll to continue reading.

“It’s hard to categorize the “most likely attack scenario” because it all depends on the motives of the attacker,” said Beardsley. “Attacks on SCADA systems can run the gamut of simple denial of service, to the planting of malware, to the more sophisticated and subtle attacks of introducing defects in an end product being manufactured on the factory floor, to the destruction of extremely expensive industrial equipment.”

“As far as mitigations to the attack scenarios, network controls which make arbitrary connections from the Internet impossible are the most critical first step any organization can do,” Beardsley added. “In most cases, these systems are accidentally accessible from the Internet, so a thorough audit of network segmentation and firewall rules is in order for any site that has these devices online. Of course, customers of Yokogawa are encouraged to contact Yokogawa’s sales and service representatives for any advice, mitigation strategies, or other concerns with the released patches.”

*This story has been updated to reflect that Julian Vilas works with Scytl, not esCERT. 

Related Content

ICS/OT

UK’s NCSC releases security guidance for OT organizations considering migrating their SCADA solutions to the cloud.

ICS/OT

In an age of increasing geopolitical tensions caused by actual wars, and the threat of Chinese action against Taiwan, OT is a target that...

ICS/OT

SecurityWeek interviews Del Rodillas, Senior Director of Product Management at Palo Alto Networks, about the integration of IT and OT in the ICS threat landscape.

ICS/OT

Seven vulnerabilities found in Rapid SCADA could be exploited to gain access to sensitive industrial systems, but they remain unpatched.

ICS/OT

The Municipal Water Authority of Aliquippa was just one of multiple organizations breached in the U.S. by Iran-linked "Cyber Av3ngers" hackers

ICS/OT

Members of Congress asked the U.S. Justice Department to investigate how foreign hackers breached a water authority near Pittsburgh, prompting CISA to warn other...

ICS/OT

SecurityWeek’s 2023 ICS Cybersecurity Conference continues in Atlanta, as hundreds of industrial cybersecurity stakeholders gather for Day 2 of the annual industrial cybersecurity conference.

ICS/OT

Join SecurityWeek and TXOne Networks for this webinar as we expose common misconceptions surrounding the security of Operational Technology (OT) and dive into the...

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version