Lucene search

K
icsIndustrial Control Systems Cyber Emergency Response TeamICSA-17-178-01
HistoryJun 27, 2017 - 12:00 p.m.

Newport XPS-Cx, XPS-Qx

2017-06-2712:00:00
Industrial Control Systems Cyber Emergency Response Team
www.cisa.gov
22

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

58.5%

CVSS v3 7.5

**ATTENTION:**Remotely exploitable/low skill level to exploit.

Vendor: Newport

Equipment: XPS-Cx, XPS-Qx

Vulnerability: Improper Authentication

AFFECTED PRODUCTS

The following versions of XPS-Cx and XPS-Qx, a universal motion controller, are affected:

  • XPS-Cx all versions, and
  • XPS-Qx all versions.

IMPACT

Successful exploitation of this vulnerability may allow an attacker to view and edit settings without authenticating by accessing a specific uniform resource locator (URL).

MITIGATION

Newport reports that this issue will be addressed in the next generation XPS-Dx controller.

NCCIC/ICS-CERT and Newport recommend that users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:

  • Not connect control components and control networks to an open network such as the Internet or an office network. Newport recommends putting control components and control networks behind a firewall.
  • Limit physical and electronic access to all automation components to authorized personnel only.
  • Change the default passwords before first use. This will reduce the risk of unauthorized access to systems.
  • Regularly change passwords. This will reduce the risk of unauthorized access to systems.
  • If remote access to control components and control networks is required, use a Virtual Private Network (VPN).
  • Regularly perform threat analyses. Check whether the measures taken meet company security requirements.
  • Use โ€œdefense-in-depthโ€ mechanisms in the systemโ€™s security configuration to restrict the access to and control of individual products and networks.
  • Minimize network exposure for all control system devices and/or systems and ensure that they are not accessible from the Internet.
  • Locate control system networks and remote devices behind firewalls and isolate them from the business network.

ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

Additional mitigation guidance and recommended practices are publicly available in the ICSโ€‘CERT Technical Information Paper, ICS-TIP-12-146-01Bโ€“Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site.

Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents.

No known public exploits specifically target this vulnerability.

VULNERABILITY OVERVIEW

IMPROPER AUTHENTICATION CWE-287

An attacker may bypass authentication by accessing a specific uniform resource locator (URL).

CVE-2017-7919 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

RESEARCHER

Maxim Rupp identified the vulnerability.

BACKGROUND

**Critical Infrastructure Sector:**Critical Manufacturing

Countries/Areas Deployed: Worldwide

Company Headquarters Location: United States

References

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

58.5%

Related for ICSA-17-178-01