Thursday, November 8, 2012

Gleg releases Ver 1.19 of the SCADA+ Exploit Pack for Immunity Canvas

On November 8, reference on the Gleb website indicates that they will be releasing version 1.19 of the SCADA+ Exploit Pack for the Immunity Canvas framework offer by Gleg. On November 9, the Immunity Inc. listserver provided confirmation that the update is now available.

Gleg remains active and devoted to continuing to release SCADA+ Exploit Pack modules on a regular basis, with this release coming just 4 weeks after v1.18!

All of the SCADA exploits included in this release cover 0-day vulnerabilities that have not been previously disclosed, including any published advisories or alerts from ICS-CERT. Both ICS systems included in this release represent reasonable risk to critical infrastructure and manufacturing facilities within the USA.

SCADA+ 1.19 includes 2 new SCADA related 0-days and new automated network device exploitation tools.

SCADA+ 1.19 modules include:
  • Siemens WinCC v7.0 SP2 CCEServer.exe Denial-of-Service [0-day]
  • GE Fanuc Proficy HMI/SCADA CIMPLICITY WebView/ThinView Server 8.10.0000.18236 Information Disclosure [0-day]
Network Devices:
  • AirTies RT104 Router - Unauthorized Configuration Download [0-day]
    This is a device typically used in Home and Small Business applications, and would not typically be found as part of ICS solutions for critical infrastructure and manufacturing operations.
  • Sitecom Home Storage Center - Authentication Bypass via Directory Traversal Vulnerability
    As the name implies, this is a Home Use NAS solution. The details of this vulnerability were discovered July 29, 2012 and publicly disclosed on or about Sept. 6, 2012
  • Thomson TWG850-4 - Unauthenticated Backup File Access
    This device is typically for Home Use Only in VoIP applications. The details of this vulnerability and associated PoC were publicly disclosed on or about Sept. 20, 2012
Information on the Gleg SCADA+ Exploit Pack can be found here, as well as information on Immunity's CANVAS here.

As always, please post your comments or suggestions to improve the usefulness of this information.

1 comment:

  1. Thanks for taking the time to discuss this, I feel strongly about it and love learning more on this topic. If possible, as you gain expertise, would you mind updating your blog with more information? It is extremely helpful for me...thanks vi nu