Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Indusoft Web Studio and InTouch Edge HMI Remote Code Execution

Critical

Synopsis

Tenable discovered an unauthenticated remote command injection vulnerability in Indusoft Web Studio 8.1 SP2. The vulnerability is exercised via the custom remote agent protocol that is typically found on port 1234 or 51234. An attacker can issue a specially crafted command 66 which causes IWS to load a DB connection file off of a network share using SMB. The DB file can contain OS commands that will be executed at the privilege level used by IWS.

Disclosure Timeline

11/02/2018 - Notified Aveva. 90 day set to Feb 4. (added some wiggle room due to weekends).
11/02/2018 - Aveva acknowledges the disclosure.
01/03/2019 - Tenable asks for an update.
01/03/2018 - Aveva states it is still being worked on.
01/17/2018 - Aveva asks Tenable to test a patch.
01/18/2018 - Tenable agrees.
01/22/2018 - Tenable tells Aveva that authentication has been enabled.
01/23/2018 - Tenable tells Aveva that command injection appears to be fixed.
01/23/2018 - Aveva thanks Tenable.
01/30/2018 - Tenable reminds Aveva of the disclosure deadline and asks if Aveva has acquired a CVE. Tenable offers to issue the CVE.
01/30/2018 - Aveva shares draft advisory with ICS-CERT and Tenable.
01/31/2018 - Tenable again asks if Aveva acquired a CVE and again offers to issue the CVE.
01/31/2018 - Aveva indicates they prefer ICS-CERT to issue CVE.
01/31/2018 - Aveva changes their release dates to Feb. 4.
02/01/2018 - Tenable asks ICS-CERT for a CVE.
02/04/2018 - ICS-CERT indicates it will issue CVE soon.
02/04/2018 - Aveva publishes their advisory.

All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]

Risk Information

Tenable Advisory ID: TRA-2019-04
CVSSv2 Base / Temporal Score:
10.0 / 8.7
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
Affected Products:
InduSoft Web Studio v8.1 SP2 and below
InTouch Edge HMI 2017 Update 2 and below
Risk Factor:
Critical
Additional Keywords:
LFSEC00000133
ICSA-19-036-01

Advisory Timeline

02/04/2019 - Initial Release
02/07/2019 - Added ICS-CERT reference