ID ZDI-14-252 Type zdi Reporter Anonymous Modified 2014-11-09T00:00:00
Description
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the DVC.DvcCtrl ActiveX Control in dvs.ocx. The control does not check the length of an attacker-supplied string in the CCDParameter method before copying it into a fixed length buffer on the stack. This allows an attacker to execute arbitrary code in the context of the browser process.
{"title": "Advantech WebAccess dvs.ocx CCDParameter Stack Buffer Overflow Remote Code Execution Vulnerability", "viewCount": 0, "modified": "2014-11-09T00:00:00", "objectVersion": "1.2", "type": "zdi", "bulletinFamily": "info", "href": "http://www.zerodayinitiative.com/advisories/ZDI-14-252", "history": [{"differentElements": ["modified"], "lastseen": "2016-09-04T11:34:02", "bulletin": {"viewCount": 0, "title": "Advantech WebAccess dvs.ocx CCDParameter Stack Buffer Overflow Remote Code Execution Vulnerability", "href": "http://www.zerodayinitiative.com/advisories/ZDI-14-252", "objectVersion": "1.2", "type": "zdi", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "modified": "2014-09-04T00:00:00", "history": [], "reporter": "Anonymous", "references": ["http://ics-cert.us-cert.gov/advisories/ICSA-14-198-02"], "published": "2014-07-18T00:00:00", "id": "ZDI-14-252", "lastseen": "2016-09-04T11:34:02", "edition": 1, "hashmap": [{"hash": "8ce495975825f7f31840fd9ddbbaabf7", "key": "references"}, {"hash": "3dd086b59554fe33c1b8f051475b4b31", "key": "type"}, {"hash": "56765472680401499c79732468ba4340", "key": "objectVersion"}, {"hash": "6dfaa17335c47523fb0370027288700e", "key": "href"}, {"hash": "cd1444668c6996c65c861b39ad51efd5", "key": "cvelist"}, {"hash": "e5d275b3ebd62646b78320753699e02e", "key": "cvss"}, {"hash": "caf9b6b99962bf5c2264824231d7a40c", "key": "bulletinFamily"}, {"hash": "490ae535f10406daf6cedd9aff199d47", "key": "published"}, {"hash": "7079c72c21415131774625ba1d64f4b0", "key": "reporter"}, {"hash": "b07c6d4c71745c4e532bb7e29c747a02", "key": "description"}, {"hash": "209a0370359de063faa692a75b1b60fd", "key": "title"}, {"hash": "9a10e9ed12ba0880a3e4c132dbded84d", "key": "modified"}], "cvelist": ["CVE-2014-2364"], "hash": "3498cd80530afd4cbad927b40426f189cf4d34cea16ea72dd4891810f82dc048", "bulletinFamily": "info", "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the DVC.DvcCtrl ActiveX Control in dvs.ocx. The control does not check the length of an attacker-supplied string in the CCDParameter method before copying it into a fixed length buffer on the stack. This allows an attacker to execute arbitrary code in the context of the browser process."}, "edition": 1}], "reporter": "Anonymous", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "references": ["http://ics-cert.us-cert.gov/advisories/ICSA-14-198-02"], "lastseen": "2016-11-09T00:17:56", "cvelist": ["CVE-2014-2364"], "edition": 2, "hashmap": [{"hash": "caf9b6b99962bf5c2264824231d7a40c", "key": "bulletinFamily"}, {"hash": "cd1444668c6996c65c861b39ad51efd5", "key": "cvelist"}, {"hash": "e5d275b3ebd62646b78320753699e02e", "key": "cvss"}, {"hash": "b07c6d4c71745c4e532bb7e29c747a02", "key": "description"}, {"hash": "6dfaa17335c47523fb0370027288700e", "key": "href"}, {"hash": "0e8f4f13c11de32dac689cf2a0ab4284", "key": "modified"}, {"hash": "56765472680401499c79732468ba4340", "key": "objectVersion"}, {"hash": "490ae535f10406daf6cedd9aff199d47", "key": "published"}, {"hash": "8ce495975825f7f31840fd9ddbbaabf7", "key": "references"}, {"hash": "7079c72c21415131774625ba1d64f4b0", "key": "reporter"}, {"hash": "209a0370359de063faa692a75b1b60fd", "key": "title"}, {"hash": "3dd086b59554fe33c1b8f051475b4b31", "key": "type"}], "id": "ZDI-14-252", "hash": "c9e394d3e202e26ac1b8b98ba4187237ae7abc2ec115c9bda8d14cbaab4c55a4", "published": "2014-07-18T00:00:00", "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the DVC.DvcCtrl ActiveX Control in dvs.ocx. The control does not check the length of an attacker-supplied string in the CCDParameter method before copying it into a fixed length buffer on the stack. This allows an attacker to execute arbitrary code in the context of the browser process.", "enchantments": {"vulnersScore": 9.3}}
{"result": {"cve": [{"id": "CVE-2014-2364", "type": "cve", "title": "CVE-2014-2364", "description": "Multiple stack-based buffer overflows in Advantech WebAccess before 7.2 allow remote attackers to execute arbitrary code via a long string in the (1) ProjectName, (2) SetParameter, (3) NodeName, (4) CCDParameter, (5) SetColor, (6) AlarmImage, (7) GetParameter, (8) GetColor, (9) ServerResponse, (10) SetBaud, or (11) IPAddress parameter to an ActiveX control in (a) webvact.ocx, (b) dvs.ocx, or (c) webdact.ocx.", "published": "2014-07-19T01:09:27", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2364", "cvelist": ["CVE-2014-2364"], "lastseen": "2016-09-03T20:13:48"}], "zdi": [{"id": "ZDI-14-254", "type": "zdi", "title": "Advantech WebAccess dvs.ocx AlarmImage Stack Buffer Overflow Remote Code Execution Vulnerability", "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the DVC.DvcCtrl ActiveX Control in dvs.ocx. The control does not check the length of an attacker-supplied string in the AlarmImage method before copying it into a fixed length buffer on the stack. This allows an attacker to execute arbitrary code in the context of the browser process.", "published": "2014-07-18T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://www.zerodayinitiative.com/advisories/ZDI-14-254", "cvelist": ["CVE-2014-2364"], "lastseen": "2016-11-09T00:18:15"}, {"id": "ZDI-14-243", "type": "zdi", "title": "Advantech WebAccess webdact.ocx ProjectName Stack Buffer Overflow Remote Code Execution Vulnerability", "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the webdact.ocx ActiveX Control. The control does not check the length of an attacker-supplied ProjectName string before copying it into a fixed length buffer on the stack. This could allow an attacker to execute arbitrary code in the context of the browser process.", "published": "2014-07-18T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://www.zerodayinitiative.com/advisories/ZDI-14-243", "cvelist": ["CVE-2014-2364"], "lastseen": "2016-11-09T00:18:04"}, {"id": "ZDI-14-244", "type": "zdi", "title": "Advantech WebAccess webdact.ocx NodeName Stack Buffer Overflow Remote Code Execution Vulnerability", "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the webdact.ocx ActiveX Control. The control does not check the length of an attacker-supplied NodeName string before copying it into a fixed length buffer on the stack. This could allow an attacker to execute arbitrary code in the context of the browser process.", "published": "2014-07-18T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://www.zerodayinitiative.com/advisories/ZDI-14-244", "cvelist": ["CVE-2014-2364"], "lastseen": "2016-11-09T00:18:10"}, {"id": "ZDI-14-253", "type": "zdi", "title": "Advantech WebAccess dvs.ocx SetColor Stack Buffer Overflow Remote Code Execution Vulnerability", "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the DVC.DvcCtrl ActiveX Control in dvs.ocx. The control does not check the length of an attacker-supplied string in the SetColor method before copying it into a fixed length buffer on the stack. This allows an attacker to execute arbitrary code in the context of the browser process.", "published": "2014-07-18T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://www.zerodayinitiative.com/advisories/ZDI-14-253", "cvelist": ["CVE-2014-2364"], "lastseen": "2016-11-09T00:18:13"}, {"id": "ZDI-14-255", "type": "zdi", "title": "Advantech WebAccess dvs.ocx GetColor Stack Buffer Overflow Remote Code Execution Vulnerability", "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the DVC.DvcCtrl ActiveX Control in dvs.ocx. The control does not check the length of an attacker-supplied string in the GetColor method before copying it into a fixed length buffer on the stack. This allows an attacker to execute arbitrary code in the context of the browser process.", "published": "2014-07-18T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://www.zerodayinitiative.com/advisories/ZDI-14-255", "cvelist": ["CVE-2014-2364"], "lastseen": "2016-11-09T00:17:47"}, {"id": "ZDI-14-246", "type": "zdi", "title": "Advantech WebAccess dvs.ocx GetParameter Stack Buffer Overflow Remote Code Execution Vulnerability", "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the DVC.DvcCtrl ActiveX Control in dvs.ocx. The control does not check the length of an attacker-supplied string in the GetParameter method before copying it into a fixed length buffer on the stack. This allows an attacker to execute arbitrary code in the context of the browser process.", "published": "2014-07-18T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://www.zerodayinitiative.com/advisories/ZDI-14-246", "cvelist": ["CVE-2014-2364"], "lastseen": "2016-11-09T00:17:57"}, {"id": "ZDI-14-241", "type": "zdi", "title": "Advantech WebAccess webvact.ocx ProjectName Stack Buffer Overflow Remote Code Execution Vulnerability", "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the webvact.ocx ActiveX Control. The control does not check the length of an attacker-supplied ProjectName string before copying it into a fixed length buffer on the stack. This allows an attacker to execute arbitrary code in the context of the browser process.", "published": "2014-07-18T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://www.zerodayinitiative.com/advisories/ZDI-14-241", "cvelist": ["CVE-2014-2364"], "lastseen": "2016-11-09T00:17:54"}, {"id": "ZDI-14-256", "type": "zdi", "title": "Advantech WebAccess dvs.ocx ServerResponse Stack Buffer Overflow Remote Code Execution Vulnerability", "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the DVC.DvcCtrl ActiveX Control in dvs.ocx. The control does not check the length of an attacker-supplied string in the ServerResponse method before copying it into a fixed length buffer on the stack. This allows an attacker to execute arbitrary code in the context of the browser process.", "published": "2014-07-18T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://www.zerodayinitiative.com/advisories/ZDI-14-256", "cvelist": ["CVE-2014-2364"], "lastseen": "2016-11-09T00:18:07"}, {"id": "ZDI-14-247", "type": "zdi", "title": "Advantech WebAccess dvs.ocx SetBaud Stack Buffer Overflow Remote Code Execution Vulnerability", "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the DVC.DvcCtrl ActiveX Control in dvs.ocx. The control does not check the length of an attacker-supplied string in the SetBaud method before copying it into a fixed length buffer on the stack. This allows an attacker to execute arbitrary code in the context of the browser process.", "published": "2014-07-18T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://www.zerodayinitiative.com/advisories/ZDI-14-247", "cvelist": ["CVE-2014-2364"], "lastseen": "2016-11-09T00:18:10"}, {"id": "ZDI-14-248", "type": "zdi", "title": "Advantech WebAccess dvs.ocx IPAddress Stack Buffer Overflow Remote Code Execution Vulnerability", "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the DVC.DvcCtrl ActiveX Control in dvs.ocx. The control does not check the length of an attacker-supplied string used to set the IPAddress property before copying it into a fixed length buffer on the stack. This allows an attacker to execute arbitrary code in the context of the browser process.", "published": "2014-07-18T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://www.zerodayinitiative.com/advisories/ZDI-14-248", "cvelist": ["CVE-2014-2364"], "lastseen": "2016-11-09T00:18:04"}], "exploitdb": [{"id": "EDB-ID:34757", "type": "exploitdb", "title": "Advantech WebAccess dvs.ocx GetColor Buffer Overflow", "description": "Advantech WebAccess dvs.ocx GetColor Buffer Overflow. CVE-2014-2364. Remote exploit for windows platform", "published": "2014-09-24T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.exploit-db.com/exploits/34757/", "cvelist": ["CVE-2014-2364"], "lastseen": "2016-02-03T23:52:40"}], "metasploit": [{"id": "MSF:EXPLOIT/WINDOWS/BROWSER/ADVANTECH_WEBACCESS_DVS_GETCOLOR", "type": "metasploit", "title": "Advantech WebAccess dvs.ocx GetColor Buffer Overflow", "description": "This module exploits a buffer overflow vulnerability in Advantec WebAccess. The vulnerability exists in the dvs.ocx ActiveX control, where a dangerous call to sprintf can be reached with user controlled data through the GetColor function. This module has been tested successfully on Windows XP SP3 with IE6 and Windows 7 SP1 with IE8 and IE 9.", "published": "2014-09-12T13:57:54", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "", "cvelist": ["CVE-2014-2364"], "lastseen": "2018-04-20T14:29:57"}], "zdt": [{"id": "1337DAY-ID-22683", "type": "zdt", "title": "Advantech WebAccess dvs.ocx GetColor Buffer Overflow Exploit", "description": "This Metasploit module exploits a buffer overflow vulnerability in Advantec WebAccess. The vulnerability exists in the dvs.ocx ActiveX control, where a dangerous call to sprintf can be reached with user controlled data through the GetColor function. This Metasploit module has been tested successfully on Windows XP SP3 with IE6 and Windows 7 SP1 with IE8 and IE 9.", "published": "2014-09-24T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://0day.today/exploit/description/22683", "cvelist": ["CVE-2014-2364"], "lastseen": "2018-02-15T19:08:41"}], "packetstorm": [{"id": "PACKETSTORM:128384", "type": "packetstorm", "title": "Advantech WebAccess dvs.ocx GetColor Buffer Overflow", "description": "", "published": "2014-09-24T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://packetstormsecurity.com/files/128384/Advantech-WebAccess-dvs.ocx-GetColor-Buffer-Overflow.html", "cvelist": ["CVE-2014-2364"], "lastseen": "2016-12-05T22:21:38"}], "ics": [{"id": "ICSA-14-198-02", "type": "ics", "title": "Advantech WebAccess Vulnerabilities", "description": "## OVERVIEW\n\nNCCIC/ICS-CERT received a report from the Zero Day Initiative (ZDI) concerning vulnerabilities affecting the Advantech WebAccess application. These vulnerabilities were reported to ZDI by security researchers Dave Weinstein, Tom Gallagher, John Leitch, and others. Advantech has produced an updated software version that mitigates these vulnerabilities.\n\nThese vulnerabilities could be exploited remotely. Exploits that target these vulnerabilities are known to be publicly available.\n\n## AFFECTED PRODUCTS\n\nThe following Advantech WebAcess versions are affected:\n\n * Advantech WebAcess v7.1 and earlier.\n\n## IMPACT\n\nAn attacker exploiting these vulnerabilities in WebAccess may be able to bypass authentication or cause a denial of service.\n\nImpact to individual organizations depends on many factors that are unique to each organization. ICS-CERT recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation.\n\n## BACKGROUND\n\nAdvantech is based in Taiwan and has distribution offices in 21 countries worldwide.\n\nAdvantech WebAccess, formerly known as BroadWin WebAccess, is a web-based SCADA and human-machine interface product used in energy, critical manufacturing, commercial facilities, and government facilities. These systems are deployed globally.\n\n## VULNERABILITY CHARACTERIZATION\n\n### VULNERABILITY OVERVIEW\n\n### STACK-BASED BUFFER OVERFLOWSa\n\nThere are multiple ways to overflow the static stack buffer by providing overly long strings to specific parameters (namely ProjectName, SetParameter, NodeName, CCDParameter, SetColor, AlarmImage, GetParameter, GetColor, ServerResponse, SetBaud, and IPAddress) within the webvact.ocx, dvs.ocx, and webdact.ocx ActiveX files.\n\nCVE-2014-2364b has been assigned to these vulnerabilities. A CVSS v2 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/Au:N/C:P/I:P/A:P).c\n\n### UNSAFE ACTIVEX CONTROL MARKED SAFE FOR SCRIPTINGd\n\nThe bwocxrun ActiveX control (installed by default as part of setup) allows navigation from the Internet to a local file. This is accomplished through the BrowseFolder method.\n\nCVE-2014-2368e has been assigned to this vulnerability. A CVSS v2 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/Au:N/C:P/I:P/A:P).f\n\n### REMOTE AUTHENTICATION BYPASSg\n\nThe ChkCookie subroutine within broadweb\\include\\gChkCook.asp ActiveX control (installed by default as part of setup) allows navigation from the Internet to a local file. If user, proj, and scada are set, and bwuser is set to true, this will grant access to several previously restricted pages.\n\nCVE-2014-2367h has been assigned to this vulnerability. A CVSS v2 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/Au:N/C:P/I:P/A:P).i\n\n### PASSWORD DISCLOSUREj\n\nThe upAdminPg.asp component includes the password of the specified account in the underlying HTML when serving the page.\n\nCVE-2014-2366k has been assigned to this vulnerability. A CVSS v2 base score of 9.0 has been assigned; the CVSS vector string is (AV:N/AC:L/Au:S/C:C/I:C/A:C).l\n\n### REMOTE CODE EXECUTIONm\n\nAdvantech WebAccess contains a flaw that enables a malicious user to arbitrarily create and delete files.\n\nCVE-2014-2365n has been assigned to this vulnerability. A CVSS v2 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/Au:S/C:P/I:P/A:P).o\n\n### VULNERABILITY DETAILS\n\n#### EXPLOITABILITY\n\nThese vulnerabilities could be exploited remotely.\n\n#### EXISTENCE OF EXPLOIT\n\nExploits that target these vulnerabilities are publicly available.\n\n#### DIFFICULTY\n\nAn attacker with a moderate skill would be able to exploit these vulnerabilities.\n\n## MITIGATION\n\nAdvantech released a new WebAccess Installation Package v7.2 on June 6, 2014, that removes some vulnerable ActiveX components and resolves the vulnerabilities within others. The download link for v7.2 is available at:\n\n<http://webaccess.advantech.com/>\n\nICS-CERT encourages asset owners to take additional defensive measures to protect against this and other cybersecurity risks.\n\n * Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet.\n * Locate control system networks and remote devices behind firewalls, and isolate them from the business network.\n * When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.\n\nICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT web page at: <http://ics-cert.us-cert.gov/content/recommended-practices>. Several recommended practices are available for reading and download, including [Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.](<http://ics-cert.us-cert.gov/sites/default/files/recommended_practices/Defense_in_Depth_Oct09.pdf>) ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\n\nAdditional mitigation guidance and recommended practices are publicly available in the ICS\u2011CERT Technical Information Paper, [ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies](<http://ics-cert.us-cert.gov/tips/ICS-TIP-12-146-01B>), that is available for download from the ICS-CERT web site (<http://ics-cert.us-cert.gov/>).\n\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents.\n\n * a. CWE-121: Stack-Based Buffer Overflow, <http://cwe.mitre.org/data/definitions/121.html>, web site last accessed July 17, 2014.\n * b. NVD, <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2364> , NIST uses this advisory to create the CVE web site report. This web site will be active sometime after publication of this advisory.\n * c. CVSS Calculator, [http://nvd.nist.gov/cvss.cfm?version=2&vector=AV:N/AC:L/Au:N/C:P/I:P/A:P](<http://nvd.nist.gov/cvss.cfm?version=2&vector=AV:N/AC:L/Au:N/C:P/I:P/A:P>), web site last accessed July 17, 2014.\n * d. CWE-623: Unsafe ActiveX Control Marked Safe For Scripting, <http://cwe.mitre.org/data/definitions/623.html>, web site last accessed July 17, 2014.\n * e. NVD, <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2368>, NIST uses this advisory to create the CVE web site report. This web site will be active sometime after publication of this advisory.\n * f. CVSS Calculator, [http://nvd.nist.gov/cvss.cfm?version=2&vector=AV:N/AC:L/Au:N/C:P/I:P/A:P](<http://nvd.nist.gov/cvss.cfm?version=2&vector=AV:N/AC:L/Au:N/C:P/I:P/A:P>), web site last accessed July 17, 2014.\n * g. CWE-592: Authentication Bypass Issues, <http://cwe.mitre.org/data/definitions/592.html>, web site last accessed July 17, 2014.\n * h. NVD, <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2367>, NIST uses this advisory to create the CVE web site report. This web site will be active sometime after publication of this advisory.\n * i. CVSS Calculator, [http://nvd.nist.gov/cvss.cfm?version=2&vector=AV:N/AC:L/Au:N/C:P/I:P/A:P](<http://nvd.nist.gov/cvss.cfm?version=2&vector=AV:N/AC:L/Au:N/C:P/I:P/A:P>), web site last accessed July 17, 2014.\n * j. CWE-316: Cleartext Storage of Sensitive Information in Memory, <http://cwe.mitre.org/data/definitions/316.html>, web site last accessed July 17, 2014.\n * k. NVD, <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2366>, NIST uses this advisory to create the CVE web site report. This web site will be active sometime after publication of this advisory.\n * l. CVSS Calculator, [http://nvd.nist.gov/cvss.cfm?version=2&vector=AV:N/AC:L/Au:S/C:C/I:C/A:C](<http://nvd.nist.gov/cvss.cfm?version=2&vector=AV:N/AC:L/Au:S/C:C/I:C/A:C>), web site last accessed July 17, 2014.\n * m. CWE-284: Improper Access Control, <http://cwe.mitre.org/data/definitions/284.html>, web site last accessed July 17, 2014.\n * n. NVD, <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2365>, NIST uses this advisory to create the CVE web site report. This web site will be active sometime after publication of this advisory.\n * o. CVSS Calculator, [http://nvd.nist.gov/cvss.cfm?version=2&vector=AV:N/AC:L/Au:S/C:P/I:P/A:P](<http://nvd.nist.gov/cvss.cfm?version=2&vector=AV:N/AC:L/Au:S/C:P/I:P/A:P>), web site last accessed July 17, 2014.\n", "published": "2014-07-17T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://ics-cert.us-cert.gov//advisories/ICSA-14-198-02", "cvelist": ["CVE-2014-2367", "CVE-2014-2365", "CVE-2014-2364", "CVE-2014-2366", "CVE-2014-2368"], "lastseen": "2017-12-04T19:02:23"}]}}