what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Progea Movicon 11.5.1181 Search Path Issues

Progea Movicon 11.5.1181 Search Path Issues
Posted Oct 31, 2017
Authored by Karn Ganeshen

Progea Movicon versions 11.5.1181 and below suffer from search path related vulnerabilities.

tags | exploit, vulnerability
advisories | CVE-2017-14017, CVE-2017-14019
SHA-256 | 3c27f46c9c35863630e0bcb760272da150ea550494090d47a78f9257d279eb07

Progea Movicon 11.5.1181 Search Path Issues

Change Mirror Download
Vendor: Progea
Equipment: Movicon SCADA/HMI
Vulnerability: Uncontrolled Search Path Element, Unquoted Search Path or
Element

Advisory URL
https://ipositivesecurity.com/2017/10/28/ics-progea-movicon-scadahmi-vulnerabilities/

ICS-CERT Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-17-290-01

CVE-ID
CVE-2017-14017
CVE-2017-14019

------------------------
AFFECTED PRODUCTS
------------------------
The following versions of Movicon HMI, an HMI software platform, are
affected:
Movicon Version 11.5.1181 and prior.

------------------------
BACKGROUND
------------------------
Critical Infrastructure Sectors: Critical Manufacturing, Energy, Food and
Agriculture, Transportation Systems, Water and Wastewater Systems
Countries/Areas Deployed: Europe, India, and United States
Company Headquarters Location: Italy


------------------------
IMPACT
------------------------
Successful exploitation of these vulnerabilities could allow privilege
escalation or arbitrary code execution.


------------------------
VULNERABILITY OVERVIEW
------------------------

UNCONTROLLED SEARCH PATH ELEMENT CWE-427
An uncontrolled search path element vulnerability has been identified,
which may allow a remote attacker without privileges to execute arbitrary
code in the form of a malicious DLL file.

This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of Movicon SCADA/HMI. User interaction is required
to exploit this vulnerability in that the malicious dll file should be
saved in any of the DLL search paths.

The specific flaw exists within the handling of a specific named DLL file
used by Movicon SCADA/HMI. By placing specific DLL file (listed below), an
attacker is able to force the process to load an arbitrary DLL. This allows
an attacker to execute arbitrary code in the context of the process.

------------------------
DLL File Name (1)
------------------------
api-ms-win-appmodel-runtime-l1-1-0.dll

------------------------
Application Executables (that look for missing DLL)
------------------------
Movicon.exe
MoviconRunTime.exe
MoviconService.exe
AlarmsImpExp.exe
ReportViewerNET.exe

------------------------
Steps to reproduce
------------------------

1. Generate a dll payload
msfvenom ap windows/exec cmd=calc.exe af dll ao
api-ms-win-appmodel-runtime-l1-1-0.dll

2. Place this dll in install directory (or C:\Windows, or any directory
defined in the PATH environment variable)
C:\Program Files\Progea\Movicon11.5\

3. Run MoviconService.exe (or any of the above listed executables), and Exit

------------------------
CVE-2017-14017 has been assigned to this vulnerability. A CVSS v3 base
score of 6.8 has been assigned; the CVSS vector string is
(AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H).


UNQUOTED SEARCH PATH OR ELEMENT CWE-428
An unquoted search path or element vulnerability has been identified, which
may allow an authorized local user to insert arbitrary code into the
unquoted service path and escalate his or her privileges.

A successful attempt would require the local user to be able to insert
their code in the system root path undetected by the OS or other security
applications where it could potentially be executed during application
startup or reboot. If successful, the local useras code would execute with
the elevated privileges of the application.

aC/ MOVICON (MOVICON) runs as LocalSystem and has path: C:\Program
Files\Progea\Movicon11.5\MoviconService.exe:

CVE-2017-14019 has been assigned to this vulnerability. A CVSS v3 base
score of 6.5 has been assigned; the CVSS vector string is
(AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H).

+++++

Best Regards,
Karn Ganeshen


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close