After learning of an improper input validation vulnerability in Cooper Power Systems’ Cybectec DNP3 Master OPC Server software, the company discontinued the server, according to a report on ICS-CERT.

Instead, Cooper Power Systems recommends its users replace the server with the SMP Gateway which mitigates this remotely exploitable vulnerability, discovered by Adam Crain of Automatak and independent researcher Chris Sistrunk.

Cooper Power Fixes SMP Gateway Bug
RuggedCom Vulnerabilities Patched
Siemens Fixes SINAMICS Bug
Elecsys Patches Vulnerability

All versions of the DNP3 Master OPC Server suffer from the issue.

Successful exploitation of this vulnerability could allow an attacker to affect the availability of the DNP3 Master OPC Server software.

Schneider Bold

Cybectec is a U.S.-based company that maintains offices in several countries around the world, including the United States and Canada.

The affected product, DNP3 Master OPC Server, supports the DNP3 outstation. According to Cybectec, its OPC servers deploy across the energy sector. Cybectec estimates these products see primary use in the United States and Latin America.

The DNP3 component in Cooper Power Systems Cybectec DNP3 Master OPC Server incorrectly validates input. An attacker could introduce an unhandled exception, causing the process to crash.

CVE-2013-2814 is the case number assigned to this vulnerability, which has a CVSS v2 base score of 7.1.

No known public exploits specifically target this vulnerability, but an attacker with a moderate skill would be able to exploit this vulnerability.

Cooper Power Systems has discontinued the OPC server and recommends that customers use the SMP Gateway product as a replacement that mitigates this vulnerability.

Pin It on Pinterest

Share This