Hi!
You can download the slides of the research I was presenting at
RootedCon'11 in Madrid "SCADA Trojans: Attacking the grid". A journey
into attacking the power grid.
I presented:
- 0days in Advantech/BroadWin WebAccess SCADA product
- Weak Design/Vulnerabilities in CSE-Semaphore TBOX RTUs
- General attack against EMS Software via State Estimators.
I contacted ICS-CERT to coordinate with Advantech but the vendor denied
having a security flaw. So guys, the exploit I'm releasing does not
exist. All is product of your mind.
Well, indeed WebAccess is full of bugs.
It is a RPC exploit against WebAccess Network Service, port 4592. It
leaks the security code that protects the scada node in addition to
demonstrate RCE on XP. Slighly modifications can be done to support
other systems.
Check the slides, there is more info about the vulns info there.
Download Exploit source code
http://www.reversemode.com/downloads/exploit_advantech.zip
Download Slides [PDF] "SCADA Trojans: Attacking the Grid"
http://www.reversemode.com/downloads/Scada_Trojans_Ruben_Rootedcon.pdf
Regards,
Ruben.
{"id": "SECURITYVULNS:DOC:25961", "bulletinFamily": "software", "title": "SCADA Trojans: Attacking the Grid + Advantech vulnerabilities", "description": "Hi!\r\n\r\nYou can download the slides of the research I was presenting at\r\nRootedCon'11 in Madrid "SCADA Trojans: Attacking the grid". A journey\r\ninto attacking the power grid.\r\n\r\nI presented:\r\n\r\n- 0days in Advantech/BroadWin WebAccess SCADA product\r\n- Weak Design/Vulnerabilities in CSE-Semaphore TBOX RTUs\r\n- General attack against EMS Software via State Estimators.\r\n\r\n\r\nI contacted ICS-CERT to coordinate with Advantech but the vendor denied\r\nhaving a security flaw. So guys, the exploit I'm releasing does not\r\nexist. All is product of your mind.\r\n\r\nWell, indeed WebAccess is full of bugs.\r\n\r\nIt is a RPC exploit against WebAccess Network Service, port 4592. It\r\nleaks the security code that protects the scada node in addition to\r\ndemonstrate RCE on XP. Slighly modifications can be done to support\r\nother systems.\r\n\r\nCheck the slides, there is more info about the vulns info there.\r\n\r\nDownload Exploit source code\r\nhttp://www.reversemode.com/downloads/exploit_advantech.zip\r\n\r\nDownload Slides [PDF] "SCADA Trojans: Attacking the Grid"\r\nhttp://www.reversemode.com/downloads/Scada_Trojans_Ruben_Rootedcon.pdf\r\n\r\nRegards,\r\nRuben.", "published": "2011-03-23T00:00:00", "modified": "2011-03-23T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:25961", "reporter": "Securityvulns", "references": [], "cvelist": [], "type": "securityvulns", "lastseen": "2018-08-31T11:10:39", "edition": 1, "viewCount": 20, "enchantments": {"score": {"value": -0.1, "vector": "NONE"}, "dependencies": {"references": [{"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:11516"]}], "rev": 4}, "backreferences": {"references": [{"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:11516"]}]}, "exploitation": null, "vulnersScore": -0.1}, "affectedSoftware": [], "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645443073, "score": 1659803227}, "_internal": {"score_hash": "5a830a89c7a5cbf9fa7f21bc6080f527"}}