3S-Smart Software Solutions GmbH released a new version to handle an incorrect permission assignment for critical resource in its CODESYS Control V3 online user management, according to a report with CISA.
Successful exploitation of this remotely exploitable vulnerability could allow unauthorized actors access to unintended functionality and/or information.
In the vulnerability, the online user management may incorrectly grant access to sub objects, even if the logged-in user does not have inherited permission to access them.
CVE-2019-9008 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 8.8.
The following CODESYS V3 runtime systems, all versions prior to 220.127.116.11 containing the CmpUserMgr component suffer from the issue:
• CODESYS Control for BeagleBone
• CODESYS Control for emPC-A/iMX6
• CODESYS Control for IOT2000
• CODESYS Control for PFC100
• CODESYS Control for PFC200
• CODESYS Control for Raspberry Pi
• CODESYS Control RTE V3
• CODESYS Control RTE V3 (for Beckhoff CX)
• CODESYS Control Win V3 (also part of the CODESYS Development System setup)
• CODESYS V3 Simulation Runtime (part of the CODESYS Development System)
• CODESYS HMI V3
The product sees use mainly in the critical manufacturing sector and it also sees action on a global basis.
No known public exploits specifically target this vulnerability. However, an attacker with low skill level could leverage the vulnerability.
Germany-based 3S-Smart Software Solutions GmbH released Version 18.104.22.168 to resolve this vulnerability for all affected CODESYS products.
Click on the CODESYS update page for more information on how to obtain the software update.
As part of a security strategy, 3S-Smart Software Solutions GmbH recommends the following general defense measures to reduce the risk of exploits:
• Use controllers and devices only in a protected environment to minimize network exposure and ensure that they are not accessible from outside
• Use firewalls to protect and separate the control system network from other networks
• Use VPN (virtual private networks) tunnels if remote access is required
• Activate and apply user management and password features
• Limit the access to both development and control system by physical means, operating system features
• Protect development and control system by using up to date virus detecting solutions
For more information and general recommendations for protecting machines and plants, see also the CODESYS security whitepaper.
For more information, 3S-Smart Software Solutions GmbH released a security report.