PT-2014-39: Directory traversal in Honeywell EPKS

2014-02-06T00:00:00
ID PT-2014-39
Type ptsecurity
Reporter Positive Technologies
Modified 2014-11-18T00:00:00

Description

PT-2014-39: Directory traversal in Honeywell EPKS

Vulnerable software

Honeywell EPKS
Version: R311

Link:
<http://honeywell.com/>

Severity level

Severity level: Medium
Impact: Directory traversal
Access Vector: Remote

CVSS v2:
Base Score: 5.0
Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVE: not assigned

Software description

Honeywell Experion PKS is a cost-effective open control and safety system that expands the role of distributed control. Experion provides a safe, robust, scalable, plant-wide system with unprecedented connectivity through all levels of the plant.

Vulnerability description

The specialists of the Positive Research center have detected a Directory traversal vulnerability in Honeywell EPKS.

Function hsc_s_confpnt() from module confd.exe doesn’t check input and output filename parameters for command which leads to file inclusion as stated in previous vulnerability and also allows to request resources via directory traversal which allows to read system files.

How to fix

Update your sofware up to the latest version

Advisory status

06.03.2014 - Vendor gets vulnerability details
02.06.2014 - Vendor releases fixed version and details
18.11.2014 - Public disclosure

Credits

The vulnerability was detected by Kirill Nesterov, Positive Research Center (Positive Technologies Company)

References

<http://en.securitylab.ru/lab/PT-2014-39>

Reports on the vulnerabilities previously discovered by Positive Research:

<http://www.ptsecurity.com/research/advisory/>
<http://en.securitylab.ru/lab/>