Lucene search

K
ptsecurityPositive TechnologiesPT-2013-40
HistoryDec 16, 2012 - 12:00 a.m.

PT-2013-40: Resource Exhaustion in Wonderware Information Server

2012-12-1600:00:00
Positive Technologies
www.ptsecurity.com
6

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.003 Low

EPSS

Percentile

71.3%

PT-2013-40: Resource Exhaustion in Wonderware Information Server

Vulnerable software

Wonderware Information Server
Version 4.0 SP1, 4.5- Portal and 5.0- Portal

Application link:
<http://www.invensys.com/&gt;[](&lt;http://global.wonderware.com/EN/Pages/default.aspx&gt;)

Severity level

Severity level: High
Impact: Arbitrary Code Execution, Denial of Service
Access Vector: Remote

CVSS v2:
Base Score: 9.3
Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVE: CVE-2013-0685

Software description

Wonderware Information Server aggregates and presents plant performance metrics and production data to operations, maintenance and engineering personnel, via an easy to implement web solution. Wonderware Information Server as well as Wonderware Intouch HMI are the part of a unified solution for building ArchestrA System Platform SCADA- and HMI-systems. This solution is used by personnel of nuclear power plants, chemical plants and other critically important objects.

Vulnerability description

Positive Research Center experts have discovered “Resource Exhaustion” vulnerability in Wonderware Information Server.

WIS does not properly restrict the size or amount of resources that are requested, allowing the attacker to consume more resources than intended. This vulnerability, if exploited, could allow remote code execution and DoS.

How to fix

Update your software up to the latest version.

Advisory status

16.12.2012 - Vendor gets vulnerability details
23.04.2013 - Vendor releases fixed version and details
10.06.2013 - Public disclosure

Credits

This vulnerability have discovered by Ivan Poliyanchuk, Evgeny Ermakov, Nikita Mikhalevsky, Dmitry Serebryannikov, Vyacheslav Egoshin, Gleb Gritsai, Denis Baranov, Positive Research Center (Positive Technologies Company)

References

<http://en.securitylab.ru/lab/PT-2013-40&gt;
https://wdn.wonderware.com/sites/WDN/Pages/Downloads/Software.aspx
<https://ics-cert.us-cert.gov/advisories/ICSA-13-113-01&gt;[](&lt;http://www.kb.cert.org/vuls/id/309979&gt;)[](&lt;http://en.securitylab.ru/lab/PT-2013-36&gt;)

Reports on the vulnerabilities previously discovered by Positive Research:

<http://ptsecurity.com/research/advisory/&gt;
<http://en.securitylab.ru/lab/&gt;

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.003 Low

EPSS

Percentile

71.3%

Related for PT-2013-40