SCADA Engine BACnet OPC Server < 2.1.371.24 Multiple Vulnerabilities

2015-04-09T00:00:00
ID SCADA_BACNET_OPC_SERVER_2_1_371_24.NBIN
Type nessus
Reporter This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
Modified 2021-07-22T00:00:00

Description

The remote host is running a version of SCADA Engine BACnet OPC Server prior to version 2.1.371.24. It is, therefore, affected by multiple vulnerabilities :

  • A heap-based buffer overflow exists in the SOAP web interface, which a remote attacker, using a specially crafted packet, can exploit to execute arbitrary code or crash the service. (CVE-2015-0979)

  • An vulnerability exists in 'BACnetOPCServer.exe' due to not properly sanitizing user-supplied input. A remote attacker, using format string specifiers, can exploit this to execute arbitrary code or crash the service. (CVE-2015-0980)

  • An authentication bypass flaw exists in the SOAP web interface, which allows a remote attacker to read or write or delete arbitrary database fields. (CVE-2015-0981)

                                        
                                            Binary data scada_bacnet_opc_server_2_1_371_24.nbin