Your one-stop web resource providing safety and security information to manufacturers

AVEVA Software, LLC (AVEVA) has an update to mitigate an improper restriction of operations within the bounds of a memory buffer vulnerability in its Wonderware License Server, according to a report with NCCIC.

Successful exploitation of this remotely exploitable vulnerability, discovered by an anonymous researcher who reported it to AVEVA, may result in remote code execution with administrative privileges.

AVEVA Clears InTouch Access Anywhere Hole
WECON Mitigation for LeviStudioU Holes
Johnson Controls’ Error Message Mitigation
Davolink Clears Network Switch Hole

The following versions of Wonderware License Server use the vulnerable Flexara Imgrd (Versions and prior):
• Wonderware License Server v4.0.13100 and prior.

Only users with the Counted Licenses feature with “ArchestrAServer.lic” in Wonderware License Server are affected.

Schneider Bold

Wonderware License Server is delivered by:
• Wonderware Information Server 4.0 SP1 and prior
• Historian Client 2014 R4 SP2 P02 and prior

In the vulnerability, buffer overflows in lmgrd and vendor daemon in Flexera FlexNet Publisher may allow remote attackers to execute arbitrary code via a crafted packet, resulting in remote code execution with administrator privileges.

CVE-2015-8277 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 9.8.

The product sees use mainly in the chemical, critical manufacturing, energy, food and agriculture, and water and wastewater sectors. It also sees action on a global basis.

No known public exploits specifically target this vulnerability. However, an attacker with low skill level could leverage the vulnerability.

AVEVA recommends affected users install update “Hotfix Wonderware License Server VU-485744” or later. (login required)

AVEVA published Security Bulletin LFSEC00000129.

Pin It on Pinterest

Share This