Lucene search

K
talosTalos IntelligenceTALOS-2024-1949
HistoryApr 03, 2024 - 12:00 a.m.

Open Automation Software OAS Platform OAS Engine User Configuration improper input validation vulnerability

2024-04-0300:00:00
Talos Intelligence
www.talosintelligence.com
9
open automation software
oas platform
user configuration
input validation
vulnerability
network requests
oas engine
mitigation
cve-2024-27201
cwe-20
cisco talos
configuration server restriction

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

6.8 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

14.1%

Talos Vulnerability Report

TALOS-2024-1949

Open Automation Software OAS Platform OAS Engine User Configuration improper input validation vulnerability

April 3, 2024
CVE Number

CVE-2024-27201

SUMMARY

An improper input validation vulnerability exists in the OAS Engine User Configuration functionality of Open Automation Software OAS Platform V19.00.0057. A specially crafted series of network requests can lead to unexpected data in the configuration. An attacker can send a sequence of requests to trigger this vulnerability.

CONFIRMED VULNERABLE VERSIONS

The versions below were either tested or verified to be vulnerable by Talos or confirmed to be vulnerable by the vendor.

Open Automation Software OAS Platform V19.00.0057

PRODUCT URLS

OAS Platform - <https://openautomationsoftware.com/knowledge-base/getting-started-with-oas/&gt;

CVSSv3 SCORE

4.9 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

CWE

CWE-20 - Improper Input Validation

DETAILS

The OAS Platform, capable of running on a variety of systems including Windows, Linux, and Docker, was built to facilitate simplified communication between various proprietary devices and applications that might otherwise be incompatible. This is done through use of the “Universal Data Connector”. In the “Connectivity Layer” OAS acts as an “IoT Gateway and protocol bus,” allowing for native communication with devices, databases, and cloud services. Connectors implemented in the “Connectivity Layer” can then communicate with each other via the OAS Live Data Cloud, representing the “Aggregation Layer”. This information can then be stored, analyzed, and visualized through the data historian, alarm logging/notification, and visualization tools that make up the “Application Layer”. OAS additionally exposes a few sets of developer tools, allowing for programmatic access to the platform.

Access to the various features of the OAS Engine and associated data is controlled through use of OAS engine application users. Application administrator users are able to add additional users to the application with varying levels of permissions. It is important to note that these users exist within the OAS Engine exclusively, not on the underlying system.

To add a new user, a Config_SetProperties protobuf can be leveraged as part of a greater authenticated request to specify the username. The format of this structure resembles the following where the ItemNames field contains an array of keys indicating the fields being modified, and the OASValues field contains an array of values associated with those keys.

message Config_SetProperties {
  string Name = 1;
  repeated string ItemNames = 2;
  repeated OAS_Value OASValues = 3;
  bool Adding = 4;
}

When configuring a platform user, seven fields can be set: Name, Password, SecurityGroup, Field1, Field2, Field3, and Field4. Of these seven, the last five have no filtering performed on the value entered for the username, allowing a wide variety of characters not appropriate for user information to be entered and subsequently stored to the running configuration.

When valid OAS Platform credentials are known, it is possible to gain access to the underlying system by adding a user with any of the affected fields containing an SSH key and saving the configuration to a strategic location.

Mitigation

Access to the OAS Engine configuration server and its traffic should be restricted to exclusively those hosts authorized for configuration.

TIMELINE

2024-02-29 - Vendor Disclosure
2024-04-03 - Vendor Patch Release
2024-04-03 - Public Release

Credit

Discovered by Jared Rittle of Cisco Talos.


Vulnerability Reports Next Report

TALOS-2024-1951

Previous Report

TALOS-2023-1887

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

6.8 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

14.1%

Related for TALOS-2024-1949