ICS-CERT: Progea Movicon Memory Corruption Vulnerability

Friday, May 11, 2012

Infosec Island Admin

7fef78c47060974e0b8392e305f0daf0

Security researcher Dillon Beresford of IXIA has identified a memory corruption vulnerability in the Progea Movicon application. This vulnerability can be exploited by a remote attacker; however, no public exploits are currently known to exist.

ICS-CERT has coordinated these vulnerabilities with Progea, which has produced a new version (V11.3) that resolves the reported vulnerability. Mr. Beresford has tested the new version and confirms that it resolves the vulnerability.

Progea reports that the following products are affected:

• Movicon versions prior to 11.3.

IMPACT

An attacker can cause the server to read an invalid memory address resulting in a denial of service.

Impact to individual organizations depends on many factors that are unique to each organization. ICS-CERT recommends that organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation.

BACKGROUND

Progea Srl is an Italian company that offers SCADA products that are deployed primarily in Europe, India, and the United States. They are used in energy, water, critical manufacturing, and several other industry sectors.

Movicon 11 is an XML-based human-machine interface development system that includes drivers for programmable logic controllers (PLCs). Movicon provides OPC-based connectivity for data transfer, including OPC DA and OPC XML DA services.

VULNERABILITY OVERVIEW

MEMORY CORRUPTION VULNERABILTIY:  Movicon is affected by an out-of-bounds read vulnerability that can be exploited by sending a specially crafted HTTP POST request to the Movicon OPC server (default Port 9090/TCP). The request will result in a denial of service. CVE-2012-1804 has been assigned to this vulnerability. A CVSS V2 base score of 7.8 has also been assigned.

EXPLOITABILITY:  This vulnerability is remotely exploitable.

EXISTENCE OF EXPLOIT:  No known exploits specifically target this vulnerability.

DIFFICULTY:  An attacker with a medium skill level would be able to exploit these vulnerabilities.

MITIGATION

To resolve this issue, Progea recommends installing the new version of Movicon. Users can download the new version at http://www.progea.com/en-us/downloads/programs.aspx; registration is required to access the new version.

The full ICS-CERT advisory can be found here:

Source:  http://www.us-cert.gov/control_systems/pdf/ICSA-12-131-01.pdf

Possibly Related Articles:
8229
SCADA
Industrial Control Systems
Denial of Service SCADA Exploits Advisory ICS-CERT Industrial Control Systems vulnerability Memory Corruption Progea Movicon
Post Rating I Like this!
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.