Vendor: Schneider Electric Equipment: Wonderware InduSoft Web Studio Vulnerability: Incorrect Default Permissions Advisory URL: https://ipositivesecurity.com/2017/05/19/ics-schneider-electric-wonderware-indusoft-web-studio-privilege-escalation/
ICS-CERT Advisory https://ics-cert.us-cert.gov/advisories/ICSA-17-138-02 ------------------------ AFFECTED PRODUCTS ------------------------ The following versions of Schneider Electric’s Wondeware InduSoft Web Studio are affected: Wonderware InduSoft Web Studio v8.0 Patch 3 and prior versions. ------------------------ IMPACT ------------------------ Successful exploitation of this vulnerability could allow an authenticated user to escalate his or her privileges. ------------------------ VULNERABILITY OVERVIEW ------------------------ INCORRECT DEFAULT PERMISSIONS CWE-276 Upon installation, Wonderware InduSoft Web Studio creates a new directory and two files, which are placed in the system’s path and can be manipulated by non-administrators. This could allow an authenticated user to escalate his or her privileges. The directory and files are added to system’s PATH. Therefore, the following can be manipulated by non-administrator users: • File C:\Bin\x86\aahClientManaged.dll has weak permissions: ALLOW NT AUTHORITY\Authenticated Users: FILE_WRITE_DATA FILE_APPEND_DATA DELETE • File C:\Bin\x86\ has weak permissions: ALLOW NT AUTHORITY\Authenticated Users: FILE_ADD_FILE FILE_ADD_SUBDIRECTORY FILE_WRITE_EA FILE_WRITE_ATTRIBUTES DELETE CVE-2017-7968 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H). +++++ _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/