Many dangerous vulnerabilities found in famous industrial system products

Automation in real-time, paradox, matrix of sensors, Schneider… Announcement of minimum vulnerabilities at high risk
There are vulnerabilities which have not been corrected yet…

Thursday, 19 November 2020, 15:52 GMT

Security advice and details on the hazardous vulnerabilities that Real Time Automation and Paradox, experts in industrial control systems, found in their product line while waiting for the patch to be announced. It is said that exploitation of these vulnerabilities allows for remote cyber attacks.

To score 9.8-10 out of 10, the vulnerabilities were analyzed to be dangerous enough. Among these, it is known that the security company Claroty first discovered and reported one of the vulnerabilities reported by Real-Time Automation. CVE-2020-25159 is this vulnerability.

Image source: forbes

According to Clarity, an element called the 499ES ENIP of Real-Time Automation is the point where the vulnerability was found, and the type of vulnerability is called Stack Overflow. This affects all pre-499ES ENIP 2.28 versions, and it is safe to say that it is the most commonly used OT protocol in existence. If this vulnerability is triggered, it is possible to commit a DDoS attack.

The researchers at Clarity warn that ENIP from six vendors is being used in 11 product lines. The name of the vendor, however was not disclosed. Clarity reported this vulnerability to CISA, the US state agency for cybersecurity.

CVE-2020-25189, which was discovered in the IP150 Internet Module family, is the vulnerability disclosed by Paradox. Allows attacks on stack-based buffer overflow. “A successful exploit could allow remote execution of arbitrary code.” CISA, which issued a security advisory on this vulnerability, said In addition, a high-risk vulnerability called CVE-2020-25185 was also disclosed. Neither, however has yet released a patch.

In addition to the two companies, vulnerabilities in their products were also found and announced by Sensormatic Electronics and Schneider Electric.

Nine high-risk vulnerabilities were disclosed by Schneider. It consists of memory buffer related errors, out of bound light, and out of bound reading vulnerabilities found in the Interactive Graphical SCADA System.

CVE-2020-9049, which is said to be found in the following two devices, is a vulnerability to sensor electronics.

Automation in real-time, paradox, matrix of sensors, Schneider… Announcement of minimum vulnerabilities at high risk
There are vulnerabilities which have not been corrected yet…

Security advice and details on the hazardous vulnerabilities that Real Time Automation and Paradox, experts in industrial control systems, found in their product line while waiting for the patch to be announced. It is said that exploitation of these vulnerabilities allows for remote cyber attacks.

To score 9.8-10 out of 10, the vulnerabilities were analyzed to be dangerous enough. Among these, it is known that the security company Claroty first discovered and reported one of the vulnerabilities reported by Real-Time Automation. CVE-2020-25159 is this vulnerability.

According to Clarity, an element called the 499ES ENIP of Real-Time Automation is the point where the vulnerability was found, and the type of vulnerability is called Stack Overflow. This affects all pre-499ES ENIP 2.28 versions, and it is safe to say that it is the most commonly used OT protocol in existence. If this vulnerability is triggered, it is possible to commit a DDoS attack.

The researchers at Clarity warn that ENIP from six vendors is being used in 11 product lines. The name of the vendor, however was not disclosed. Clarity reported this vulnerability to CISA, the US state agency for cybersecurity.

CVE-2020-25189, which was discovered in the IP150 Internet Module family, is the vulnerability disclosed by Paradox. Allows attacks on stack-based buffer overflow. “A successful exploit could allow remote execution of arbitrary code.” CISA, which issued a security advisory on this vulnerability, said In addition, a high-risk vulnerability called CVE-2020-25185 was also disclosed. Neither, however has yet released a patch.

In addition to the two companies, vulnerabilities in their products were also found and announced by Sensormatic Electronics and Schneider Electric.

Nine high-risk vulnerabilities were disclosed by Schneider. It consists of memory buffer related errors, out of bound light, and out of bound reading vulnerabilities found in the Interactive Graphical SCADA System.

CVE-2020-9049, which is said to be found in the following two devices, is a vulnerability to sensor electronics:
1) American Dynamics victor Web Client
2) Software House C•CURE Web Client.