Lucene search

K
nessusThis script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.TENABLE_OT_ABB_CVE-2022-2513.NASL
HistoryNov 30, 2022 - 12:00 a.m.

Hitachi Energy IED Connectivity Packages and PCM600 Products Cleartext Storage of Sensitive Information (CVE-2022-2513)

2022-11-3000:00:00
This script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
11
vulnerability
ied connectivity
cleartext storage
hitachi energy
pcm600
credential storage
exploitation
unauthorized modifications
denial-of-service
tenable.ot scanner

7.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

5.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.6%

A vulnerability exists in the Intelligent Electronic Device (IED) Connectivity Package (ConnPack) credential storage function in Hitachi Energyโ€™s PCM600 product included in the versions listed below, where IEDs credentials are stored in a cleartext format in the PCM600 database. An attacker who manages to get access to the exported backup file can exploit the vulnerability and obtain credentials of the IEDs. The credentials may be used to perform unauthorized modifications such as loading incorrect configurations, reboot the IEDs or cause a denial-of-service on the IEDs.

  • A vulnerability exists in the Intelligent Electronic Device (IED) Connectivity Package (ConnPack) credential storage function in Hitachi Energyโ€™s PCM600 product included in the versions listed below, where IEDs credentials are stored in a cleartext format in the PCM600 database. An attacker who manages to get access to the exported backup file can exploit the vulnerability and obtain credentials of the IEDs.
    The credentials may be used to perform unauthorized modifications such as loading incorrect configurations, reboot the IEDs or cause a denial-of-service on the IEDs. (CVE-2022-2513)

This plugin only works with Tenable.ot. Please visit https://www.tenable.com/products/tenable-ot for more information.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(500711);
  script_version("1.7");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/03/04");

  script_cve_id("CVE-2022-2513");

  script_name(english:"Hitachi Energy IED Connectivity Packages and PCM600 Products Cleartext Storage of Sensitive Information (CVE-2022-2513)");

  script_set_attribute(attribute:"synopsis", value:
"The remote OT asset is affected by a vulnerability.");
  script_set_attribute(attribute:"description", value:
"A vulnerability exists in the Intelligent Electronic Device (IED) Connectivity Package (ConnPack) credential storage
function in Hitachi Energy's PCM600 product included in the versions listed below, where IEDs credentials are stored in
a cleartext format in the PCM600 database. An attacker who manages to get access to the exported backup file can exploit
the vulnerability and obtain credentials of the IEDs. The credentials may be used to perform unauthorized modifications
such as loading incorrect configurations, reboot the IEDs or cause a denial-of-service on the IEDs.

  - A vulnerability exists in the Intelligent Electronic Device (IED) Connectivity Package (ConnPack)
    credential storage function in Hitachi Energy's PCM600 product included in the versions listed below,
    where IEDs credentials are stored in a cleartext format in the PCM600 database. An attacker who manages to
    get access to the exported backup file can exploit the vulnerability and obtain credentials of the IEDs.
    The credentials may be used to perform unauthorized modifications such as loading incorrect
    configurations, reboot the IEDs or cause a denial-of-service on the IEDs. (CVE-2022-2513)

This plugin only works with Tenable.ot. Please visit https://www.tenable.com/products/tenable-ot for more information.");
  # https://search.abb.com/library/Download.aspx?DocumentID=8DBD000120&LanguageCode=en&DocumentPartId=&Action=Launch
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?650516de");
  script_set_attribute(attribute:"see_also", value:"https://www.cisa.gov/news-events/ics-advisories/icsa-22-333-02");
  script_set_attribute(attribute:"solution", value:
"The following text was originally created by the Cybersecurity and Infrastructure Security Agency (CISA). The original
can be found at CISA.gov.

Hitachi Energy released the following recommended immediate actions: 

- Update to PCM600 v2.11 Hotfix 20220923 or apply mitigation factors/workarounds

Hitachi Energy recommends the following steps to mitigate the risk of vulnerability exploitation: 

- Implement the least privilege principle, continuously revising permissions and accesses to PCM600 related resources,
including the backup file (a PCMI/PCMP file.)
- Use a firewall system with the minimal number of exposed ports to help protect a process control network from attacks
originating from outside the network.
- Protect process control systems from direct, physical access by unauthorized personnel. 
- Ensure process control systems are not directly connected to the internet. 
- Separate process control systems from other networks via network segmentation techniques. 
- Avoid using process control systems for browsing the internet, instant messaging, or receiving emails. 
- Scan removable storage media for malware prior to connection to a process control system.

For more information, see Hitachi Energyรขย€ย™s Cybersecurity Advisory.");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:S/C:C/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2022-2513");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(312);

  script_set_attribute(attribute:"vuln_publication_date", value:"2022/11/22");
  script_set_attribute(attribute:"patch_publication_date", value:"2022/11/22");
  script_set_attribute(attribute:"plugin_publication_date", value:"2022/11/30");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:abb:relion_650_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:abb:relion_670_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:abb:relion_sam600-io_firmware");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Tenable.ot");

  script_copyright(english:"This script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("tenable_ot_api_integration.nasl");
  script_require_keys("Tenable.ot/ABB");

  exit(0);
}


include('tenable_ot_cve_funcs.inc');

get_kb_item_or_exit('Tenable.ot/ABB');

var asset = tenable_ot::assets::get(vendor:'ABB');

var vuln_cpes = {
    "cpe:/o:abb:relion_670_firmware" :
        {"versionEndIncluding" : "3.4.1", "versionStartIncluding" : "3.0", "family" : "AbbRelion"},
    "cpe:/o:abb:relion_650_firmware" :
        {"versionEndIncluding" : "2.4.1", "versionStartIncluding" : "1.3", "family" : "AbbRelion"},
    "cpe:/o:abb:relion_sam600-io_firmware" :
        {"versionEndIncluding" : "1.2", "versionStartIncluding" : "1.0", "family" : "AbbRelion"}
};

tenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_WARNING);
VendorProductVersionCPE
abbrelion_sam600-io_firmwarecpe:/o:abb:relion_sam600-io_firmware
abbrelion_670_firmwarecpe:/o:abb:relion_670_firmware
abbrelion_650_firmwarecpe:/o:abb:relion_650_firmware

7.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

5.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.6%

Related for TENABLE_OT_ABB_CVE-2022-2513.NASL