SCADA Vulnerabilities & Exposures (SVE)

CRITIFENCE® SCADA Vulnerabilities and Exposures Database (SVE)

[SVE-914772133] Eaton ELCSoft

Date Type Platform Author EDB-ID CVE-ID OSVDB-ID Download App SIS Signature
2018-03-06OtherEatonAriele Caltabiano (kimiya) and axt working with Trend Micro's Zero Day Initiative reported the vulnerability to NCCIC.N/ACVE-2018-7511 N/AN/AN/A

Source

						
							
								
#
# Eaton ELCSoft
#


### VULNERABLE VENDOR
Eaton


### VULNERABLE PRODUCT
ELCSoft 


### RESEARCHER
Ariele Caltabiano (kimiya) and axt working with Trend Micro's Zero Day Initiative reported the vulnerability to NCCIC.


### AFFECTED PRODUCTS
ELCSoft is programming software for all Eaton ELC programmable logic controllers. The ELC programmable logic controllers are not affected by this vulnerability. The following versions of ELCSoft are affected:

ELCSoft Versions 2.04.02 and prior


### IMPACT
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code.


### VULNERABILITY OVERVIEW
IMPROPER INPUT VALIDATION CWE-20
There are multiple cases where specially crafted files could cause a buffer overflow which, in turn, may allow remote execution of arbitrary code.
CVE-2018-7511 has been assigned to this vulnerability.
A CVSS v3 base score of 6.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)





### BACKGROUND
Critical Infrastructure Sectors: Energy
Countries/Areas Deployed: Worldwide
Company Headquarters Location: Dublin, Ireland




### MITIGATION

Eaton has released new firmware for ELCSoft that is available via the following link:

http://www.eaton.com/ecm/idcplg?IdcService=GET_FILE&allowInterrupt=1&RevisionSelectionMethod=LatestReleased&noSaveAs=0&Rendition=Primary&dDocName=PCT_3313148


Eaton states the current firmware needs to be uninstalled prior to loading the update.