Gleg remains active and devoted to continuing to release SCADA+ Exploit Pack modules on a regular basis, with this release coming just 4 weeks after v1.18!
All of the SCADA exploits included in this release cover 0-day vulnerabilities that have not been previously disclosed, including any published advisories or alerts from ICS-CERT. Both ICS systems included in this release represent reasonable risk to critical infrastructure and manufacturing facilities within the USA.
SCADA+ 1.19 includes 2 new SCADA related 0-days and new automated network device exploitation tools.
SCADA+ 1.19 modules include:
- Siemens WinCC v7.0 SP2 CCEServer.exe Denial-of-Service [0-day]
- GE Fanuc Proficy HMI/SCADA CIMPLICITY WebView/ThinView Server 8.10.0000.18236 Information Disclosure [0-day]
- AirTies RT104 Router - Unauthorized Configuration Download [0-day]
This is a device typically used in Home and Small Business applications, and would not typically be found as part of ICS solutions for critical infrastructure and manufacturing operations.
- Sitecom Home Storage Center - Authentication Bypass via Directory Traversal Vulnerability
As the name implies, this is a Home Use NAS solution. The details of this vulnerability were discovered July 29, 2012 and publicly disclosed on or about Sept. 6, 2012
- Thomson TWG850-4 - Unauthenticated Backup File Access
This device is typically for Home Use Only in VoIP applications. The details of this vulnerability and associated PoC were publicly disclosed on or about Sept. 20, 2012
As always, please post your comments or suggestions to improve the usefulness of this information.