Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Several Industrial Automation Products Affected by WibuKey DRM Flaws

The products of several industrial automation companies are affected by the recently disclosed vulnerabilities found in the WibuKey digital rights management (DRM) solution from Wibu Systems.

The products of several industrial automation companies are affected by the recently disclosed vulnerabilities found in the WibuKey digital rights management (DRM) solution from Wibu Systems.

Cisco Talos revealed in December that the WibuKey DRM has three serious security flaws that can lead to information disclosure, privilege escalation, and remote code execution. Wibu patched the vulnerabilities with the release of version 6.50 and it’s important that users update the tool, especially since Cisco has made public technical information and proof-of-concept (PoC) code for each of the bugs.

The WibuKey DRM is used for thousands of applications, including by several industrial automation vendors. Cisco mentioned Straton when it published its advisories, and German industrial giant Siemens admitted recently that its SICAM 230 process control and monitoring system and SIMATIC WinCC OA human-machine interface (HMI) product are impacted as well.

Several other companies based in Central Europe have also warned customers that the WibuKey flaws expose their products to attacks.

One of them is Germany-based Phoenix Contact, whose MEVIEW3 product is affected. According to an advisory published this week by Germany’s CERT@VDE, the vendor will integrate a patched version of WibuKey into the next release of MEVIEW3.

Austria-based COPA-DATA also alerted users that some of its Zenon products use the DRM solution for dongle licensing and are affected. The company has published an 11-page advisory detailing the flaws and their impact on its products.

Learn More About ICS Flaws at SecurityWeek’s 2019 ICS Cyber Security Conference

Sprecher Automation, which is also based in Austria, also offers products that use WibuKey for dongle licensing. The company has posted an advisory listing the impacted SPRECON applications.

Advertisement. Scroll to continue reading.

Finally, Germany-based IT GmbH, which specializes in home and building automation, posted a notification it received from Wibu Systems and informed customers that the flaws impact its Elvis visualization products.

The most serious of the WibuKey flaws is CVE-2018-3991, a critical heap overflow that can be exploited by a remote attacker for arbitrary code execution by sending specially crafted TCP packets to the targeted system on port 22347.

Another critical vulnerability is CVE-2018-3990, a pool corruption that can be exploited to escalate privileges by sending specially crafted I/O request packets (IRPs).

The last vulnerability is CVE-2018-3989, which can also be exploited via specially crafted IRP requests. This security hole can allow an attacker to read kernel memory information and it has been assigned a severity rating of “medium.”

While Talos made its findings public in December, Wibu said this was done by mistake and that it initially agreed with Talos to only disclose the flaws on January 24 to give customers time to update their installations. Talos later temporarily removed its blog post and advisories, and Wibu even attempted to convince news websites, including SecurityWeek, to remove their articles covering the flaws until January 24.

Related: Flaw in Popular Framework Exposes Many ICS Devices to Attacks

Related: Web Server Used in 100 ICS Products Affected by Critical Flaw

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

Vulnerabilities

The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.