ICS-CERT also released an alert ICS-ALERT-11-230-01 on August 18 which provides some additional details on the SCADA+ Pack. Though there were no alerts or updates for SCADA+ Versions 1.2 and 1.3, the ICS-CERT update and this blog should provide good revision control.
Here are the details of the release contents cover two (2) 0-days and one (1) public vuln:
- ICSCADA blind error based SQL Injection (public, unpatched) results in admin password retrieving
- Broadwin\Advantech WebAccess7.0 multiple ActiveXs vulnerabilities (zero day)
- Broadwin WebAccess DoS PoC (zero day)
- Broadwin\Advantech WebAccess blind error based SQL Injection with filters bypass - allows admin's password retrieving. (zero day)
On June 23, Gleg released Version 1.3 of the SCADA+ Pack, which added the following modules:
- Wintr SQL injection (zero day)
- IntegraXOR 3.6.4000 SQL Injection
- Broadwin\Advantech SCADA product ActiveX Control Buffer Overflow (zero day)
- Advantech Studio ISSymbol ActiveX Control Buffer Overflow Multiple
Vulnerabilities
Additional modules include:
- Remote exploit for CoDeSys ENI Server ver 1.1.4.0. full pwn (zero day)
- RealWin SCADA Memory Corruption (this time DoS against 910/tcp) (probable zero day)
- CACHE database DoS (zero day)
- Another vector for CACHE Database DoS (zero day)
No comments:
Post a Comment