SCADA Vulnerabilities & Exposures (SVE)

CRITIFENCE® SCADA Vulnerabilities and Exposures Database (SVE)

[SVE-421224908] Trihedral VTScada Vulnerabilities

Date Type Platform Author EDB-ID CVE-ID OSVDB-ID Download App SIS Signature
2016-06-07HMIVTScadaUNDISCLOSED N/A2016-4523, 2016-4532, 2016-4510N/AN/AN/A

Source

						
							
								
#
# Trihedral VTScada Vulnerabilities
#


### OVERVIEW

An anonymous researcher has identified several vulnerabilities in Trihedral Engineering Ltd.'s Trihedral VTScada and reported them to Zero Day Initiative (ZDI), which reported them to NCCIC/ICS-CERT. Trihedral Engineering Ltd. has produced a new version to mitigate these vulnerabilities.

These vulnerabilities could be exploited remotely.




### AFFECTED PRODUCTS

Trihedral Engineering Ltd. reports that these vulnerabilities affect the following product:

VTScada versions after Version 8 and before Version 11.2.02


These vulnerabilities only apply to the WAP interface (typically Port 9201/TCP/IP). 
Only a small fraction of the installed base of VTScada uses this legacy feature.






### IMPACT

An attacker may exploit these vulnerabilities to download or view arbitrary files, or to cause the server to crash and not come back without being manually relaunched.

Impact to individual organizations depends on many factors that are unique to each organization. ICS-CERT recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation.






### BACKGROUND

Trihedral Engineering Ltd. is a Canada-based company that maintains offices in the United States and the United Kingdom.

The affected product, VTScada (also known as VTS prior to 2013), is a Windows-based SCADA system with a web interface option. According to Trihedral Engineering Ltd, VTScada is deployed across Chemical, Critical Manufacturing, Communications, Energy, Food and Agriculture, Transportation Systems, Water and Wastewater Systems, and other sectors. Trihedral Engineering Ltd. estimates that this product is used primarily in North America and Europe.





### VULNERABILITY CHARACTERIZATION


# VULNERABILITY OVERVIEW

OUT-OF-BOUNDS READ

The software can be caused to read outside the intended buffer, causing a crash.
CVE-2016-4523 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).


PATH TRAVERSAL

An attacker can replace the path in a request to retrieve any file.
CVE-2016-4532 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).


AUTHENTICATION BYPASS ISSUES

The software does not properly authenticate requests to read arbitrary files.
CVE-2016-4510 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).





### VULNERABILITY DETAILS


# EXPLOITABILITY

These vulnerabilities could be exploited remotely.


# EXISTENCE OF EXPLOIT

No known public exploits specifically target these vulnerabilities.


# DIFFICULTY

An attacker with a low skill would be able to exploit these vulnerabilities.





### MITIGATION

Trihedral Engineering Ltd. has created an updated software version (version 11.2.02) to address these vulnerabilities. This software update is available on Trihedral Engineering Ltd.'s FTP site:
ftp://ftp.trihedral.com/VTS/


Help file notes for upgrading VTScada/VTS can be found at:
http://www.trihedral.com/help/#Op_Welcome/Wel_UpgradeNotes.htm


If you have any questions or any difficulties with installing one of these updates, please call Trihedral Tech Support:
1-855-887-2232
1-902-835-1575
+44 (0) 1224 258910 for the United Kingdom