6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.2 High
AI Score
Confidence
Low
0.006 Low
EPSS
Percentile
78.6%
ICS-CERT originally released advisory “ICSA-11-332-01P—Invensys Wonderware InBatch ActiveX Vulnerabilities” in the US-CERT secure portal on November 28, 2011. This web page release was delayed to allow users time to download and install the update.
Researcher Kuang-Chun Hung of the Security Research and Service Institute−Information and Communication Security Technology Center (ICST) has identified three vulnerabilities in Invensys Wonderware InBatch. These vulnerabilities exist in the GUIControls, BatchObjSrv, and BatchSecCtrl ActiveX controls.
Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code or cause a denial of service (DoS) on systems with affected versions of Wonderware InBatch Runtime Client components.
ICS-CERT has coordinated the report with the ICST and Invensys. Invensys has issued software updates that resolve these vulnerabilities. The ICST has confirmed the software updates fully resolve the reported vulnerabilities.
The following Invensys Wonderware InBatch versions are affected:
The affected components exist in a variety of Wonderware products including InTouch and Information Server browser clients that have downloaded converted windows that contain these controls.
According to Invensys, I/A Series Batch 8.1 SP1 and Wonderware InBatch 9.5 SP1 and higher are not affected by these vulnerabilities.
If successfully exploited, these vulnerabilities could allow an attacker to execute arbitrary code on systems running affected versions of the product.
Impact to individual organizations depends on many factors that are unique to each organization. ICS-CERT recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation.
Invensys Wonderware InBatch is used in many industries worldwide including manufacturing, energy, food and beverage, chemical, and water and wastewater.
The InBatch Runtime Client provides an interface to the batch management system to allow operator interaction during the batch execution.
Affected versions of the InBatch Runtime Client components contain three buffer overflowhttp://cwe.mitre.org/data/definitions/121.html, website accessed November 28, 2011., http://cwe.mitre.org/data/definitions/122.html, website accessed November 28, 2011. vulnerabilities. These vulnerabilities could be exploited by using long string values for the properties/methods of the referenced controls. This could result in either a DoS or remote code execution running with privileges of the logged-in user.
CVE-2011-4870 has been assigned to this vulnerability. Invensys has assessed the vulnerabilities using the CVSShttp://nvd.nist.gov/cvss.cfm, website last accessed January 03, 2012. Version 2.0 calculator and gives the Overall CVSS = 6.0. Click here to review the assessment.
This vulnerability is remotely exploitable. This exploit may require social engineering.
No publicly known exploits specifically target these vulnerabilities.
An attacker with a low skill level can create the DoS; a more skilled attacker could exploit the vulnerability to execute arbitrary code.
Invensys has developed software updates to address the reported vulnerabilities. Invensys recommends that customers who are running vulnerable versions of Wonderware InBatch update their systems to either InBatch 9.0 SP2 or 9.5 on all nodes that have the InBatch client runtime and the InBatch Server installed. Installation does not require a reboot.
Customers can download updates from the “Software Download” section of the Invensys Customer First Support website.
Follow the instructions in the ReadMe section for the product and component to install the software update.
In addition to applying the software updates, Invensys has made additional recommendations to customers running vulnerable versions of the Invensys Wonderware InBatch product:
To access information related to Invensys security updates, customers can logon to the [Cyber Security Updates website ](<https://wdn.wonderware.com/sites/WDN/Pages/Security Central/default.aspx>)and the GCS Foxboro Wonderware Security Releases webpage.
ICS-CERT encourages asset owners to take additional defensive measures to protect against this and other cybersecurity risks.
The Control Systems Security Program (CSSP) also provides a section for control system security recommended practices on the CSSP web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to taking defensive measures.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents.
In addition, ICS-CERT recommends that users take the following measures to protect themselves from social engineering attacks:
support.ips.invensys.com/content/WDN/HTM/ww_security.asp.
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4870
public.govdelivery.com/accounts/USDHSCISA/subscriber/new?topic_id=USDHSCISA_138
twitter.com/CISAgov
twitter.com/intent/tweet?text=Wonderware%20InBatch%20ActiveX%20Vulnerabilities%20%28Update%20A%29+https://www.cisa.gov/news-events/ics-advisories/icsa-11-332-01a
wdn.wonderware.com/sites/WDN/Pages/Downloads/Software.aspx
wdn.wonderware.com/sites/WDN/Pages/Security Central/default.aspx
www.dhs.gov
www.dhs.gov/foia
www.dhs.gov/performance-financial-reports
www.facebook.com/CISA
www.facebook.com/sharer/sharer.php?u=https://www.cisa.gov/news-events/ics-advisories/icsa-11-332-01a&title=Wonderware%20InBatch%20ActiveX%20Vulnerabilities%20%28Update%20A%29
www.instagram.com/cisagov
www.linkedin.com/company/cybersecurity-and-infrastructure-security-agency
www.linkedin.com/sharing/share-offsite/?url=https://www.cisa.gov/news-events/ics-advisories/icsa-11-332-01a
www.oig.dhs.gov/
www.surveymonkey.com/r/CISA-cyber-survey?product=https://www.cisa.gov/news-events/ics-advisories/icsa-11-332-01a
www.usa.gov/
www.whitehouse.gov/
www.youtube.com/@cisagov
mailto:?subject=Wonderware%20InBatch%20ActiveX%20Vulnerabilities%20%28Update%20A%29&body=www.cisa.gov/news-events/ics-advisories/icsa-11-332-01a