ICS/OT

Serious Flaws Found in Lynxspring SCADA Product

A researcher has discovered some serious vulnerabilities in a SCADA product from Missouri-based building automation and management solutions provider Lynxspring. The product is no longer supported, but it’s still used by companies.

<p><strong><span><span>A researcher has discovered some serious vulnerabilities in a SCADA product from Missouri-based building automation and management solutions provider Lynxspring. The product is no longer supported, but it’s still used by companies.</span></span></strong></p>

A researcher has discovered some serious vulnerabilities in a SCADA product from Missouri-based building automation and management solutions provider Lynxspring. The product is no longer supported, but it’s still used by companies.

The flaws were found by researcher Maxim Rupp in Lynxspring’s JENEsys building operating system, specifically the BAS Bridge, which bridges the integration between Modbus TCP/RTU and BACnet IP/Ethernet devices.

According to an advisory published by ICS-CERT, the device is affected by four remotely-exploitable vulnerabilities rated as having high or critical severity. One of them, tracked as CVE-2016-8357, allows an attacker with read-only access to send specially crafted commands to the web-based application and make changes within the app.

Another issue, identified as CVE-2016-8378, refers to the storage of cleartext usernames and passwords in the database. Rupp told SecurityWeek that a combination of these two vulnerabilities enables an attacker to obtain user credentials.

A similar flaw, CVE-2016-8361, can be exploited by hackers to access the system without authentication by using a hardcoded username with no password.

Finally, Rupp discovered a cross-site request forgery (CSRF) issue that allows an attacker to carry out various types of actions (e.g. create or delete users) if they can trick a legitimate user into accessing a specially crafted link. The weakness is tracked as CVE-2016-8369.

The vulnerabilities affect BAS Bridge versions 1.1.8 and earlier. The vendor said the flaws will not be patched as the product reached end of life in 2014, and advised customers to switch to the newer Onyxx Bridge, which is not affected by the security holes.

While BAS Bridge is no longer supported, Rupp said he still identified some systems that are accessible from the Internet. “But the fact that they are not directly connected to the Internet does not mean that they are not used in the wild,” he explained.

Advertisement. Scroll to continue reading.

Lynxspring is not the only building automation company whose products have been analyzed by Rupp. A few weeks ago, ICS-CERT published an advisory describing a couple of high-severity flaws found by the expert in American Auto-Matrix products.

Related: Critical Vulnerability Found in Moxa Servers, Gateways

Related: Flaws Found in Moxa Industrial Ethernet Products

Related Content

ICS/OT

UK’s NCSC releases security guidance for OT organizations considering migrating their SCADA solutions to the cloud.

ICS/OT

In an age of increasing geopolitical tensions caused by actual wars, and the threat of Chinese action against Taiwan, OT is a target that...

ICS/OT

SecurityWeek interviews Del Rodillas, Senior Director of Product Management at Palo Alto Networks, about the integration of IT and OT in the ICS threat landscape.

ICS/OT

Seven vulnerabilities found in Rapid SCADA could be exploited to gain access to sensitive industrial systems, but they remain unpatched.

ICS/OT

The Municipal Water Authority of Aliquippa was just one of multiple organizations breached in the U.S. by Iran-linked "Cyber Av3ngers" hackers

ICS/OT

Members of Congress asked the U.S. Justice Department to investigate how foreign hackers breached a water authority near Pittsburgh, prompting CISA to warn other...

ICS/OT

SecurityWeek’s 2023 ICS Cybersecurity Conference continues in Atlanta, as hundreds of industrial cybersecurity stakeholders gather for Day 2 of the annual industrial cybersecurity conference.

ICS/OT

Join SecurityWeek and TXOne Networks for this webinar as we expose common misconceptions surrounding the security of Operational Technology (OT) and dive into the...

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version