The products of several industrial automation companies are affected by the recently disclosed vulnerabilities found in the WibuKey digital rights management (DRM) solution from Wibu Systems.
Cisco Talos revealed in December that the WibuKey DRM has three serious security flaws that can lead to information disclosure, privilege escalation, and remote code execution. Wibu patched the vulnerabilities with the release of version 6.50 and it’s important that users update the tool, especially since Cisco has made public technical information and proof-of-concept (PoC) code for each of the bugs.
The WibuKey DRM is used for thousands of applications, including by several industrial automation vendors. Cisco mentioned Straton when it published its advisories, and German industrial giant Siemens admitted recently that its SICAM 230 process control and monitoring system and SIMATIC WinCC OA human-machine interface (HMI) product are impacted as well.
Several other companies based in Central Europe have also warned customers that the WibuKey flaws expose their products to attacks.
One of them is Germany-based Phoenix Contact, whose MEVIEW3 product is affected. According to an advisory published this week by Germany’s [email protected], the vendor will integrate a patched version of WibuKey into the next release of MEVIEW3.
Austria-based COPA-DATA also alerted users that some of its Zenon products use the DRM solution for dongle licensing and are affected. The company has published an 11-page advisory detailing the flaws and their impact on its products.
Learn More About ICS Flaws at SecurityWeek’s 2019 ICS Cyber Security Conference
Sprecher Automation, which is also based in Austria, also offers products that use WibuKey for dongle licensing. The company has posted an advisory listing the impacted SPRECON applications.
Finally, Germany-based IT GmbH, which specializes in home and building automation, posted a notification it received from Wibu Systems and informed customers that the flaws impact its Elvis visualization products.
The most serious of the WibuKey flaws is CVE-2018-3991, a critical heap overflow that can be exploited by a remote attacker for arbitrary code execution by sending specially crafted TCP packets to the targeted system on port 22347.
Another critical vulnerability is CVE-2018-3990, a pool corruption that can be exploited to escalate privileges by sending specially crafted I/O request packets (IRPs).
The last vulnerability is CVE-2018-3989, which can also be exploited via specially crafted IRP requests. This security hole can allow an attacker to read kernel memory information and it has been assigned a severity rating of “medium.”
While Talos made its findings public in December, Wibu said this was done by mistake and that it initially agreed with Talos to only disclose the flaws on January 24 to give customers time to update their installations. Talos later temporarily removed its blog post and advisories, and Wibu even attempted to convince news websites, including SecurityWeek, to remove their articles covering the flaws until January 24.
Related: Flaw in Popular Framework Exposes Many ICS Devices to Attacks
Related: Web Server Used in 100 ICS Products Affected by Critical Flaw