ICS-CERT is aware of a public report detailing multiple vulnerabilities with proof-of-concept (PoC) exploit code affecting xArrow, a supervisory control and data acquisition/human-machine interface (SCADA/HMI) product.
According to this report, these vulnerabilities are remotely exploitable. This report was released by independent security researcher Luigi Auriemma without coordination with either the vendor, ICS-CERT, or any other coordination entity that ICS-CERT is aware of.
ICS-CERT has coordinated this report with vendor in order to confirm the vulnerabilities and identify mitigations. ICS-CERT is issuing this alert to provide early notice of the report and identify baseline mitigations for reducing risks to these and other cybersecurity attacks.
The report included vulnerability details and PoC exploit code for the following vulnerabilities:
Vulnerability Type: Decompression NULL Pointer
Exploitability: Remote
Impact: Denial of Service
Vulnerability Type: Heap Corruption
Exploitability: Remote
Impact: Denial of Service/Possible Arbitrary Code Execution
Vulnerability Type: Invalid Read Access
Exploitability: Remote
Impact: Denial of Service
Vulnerability Type: Memory Corruption
Exploitability: Remote
Impact: Denial of Service
MITIGATION
ICS-CERT is currently coordinating with the vendor and security researcher to identify mitigations. Please report any issues affecting control systems in critical infrastructure environments to ICS-CERT.
The full ICS-CERT advisory can be found here:
Source: http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-12-065-01.pdf