Clorius Controls A/S created an update to mitigate an insecure Java client web authentication vulnerability in its ICS SCADA server, according to a report with ICS-CERT.

Independent researcher Aditya Sood, who discovered the vulnerability, tested the update to validate that it resolves the remotely exploitable vulnerability.

ICS Software Authentication Hole Found
Schneider Patches InTouch Buffer Overflow
HART DTM Vulnerability Fixed
Network Time Protocol Vulnerabilities

Clorius Controls A/S Java web client including and prior to Version 01.00.0009b suffers from the issue.

At issue is the Java client does not have a strong authentication mechanism. The client used an insufficient encoding to pass the credentials. This may allow those with access to the network to sniff traffic and decode credentials.

Schneider Bold

Clorius Controls A/S is a Denmark-based company that maintains offices in several countries, including China, India, Russia, and Singapore.

Clorius Controls A/S web servers are web-based SCADA systems. According to Clorius Controls A/S, the web server sees action across several sectors including critical manufacturing and commercial facilities. Clorius Controls A/S estimates that these products see use primarily in Europe with a small percentage in the United States.

The method of encrypting credentials with impacted Java web client is equivalent to plain text. The credentials could end up sniffed on network traffic and easily decoded allowing an attacker complete access to the server.

CVE-2014-9199 is the case number assigned to this vulnerability, which has a CVSS v2 base score of 10.0.

No known public exploits specifically target this vulnerability, however, an attacker with a low skill would be able to exploit this vulnerability.

Clorius Controls A/S produced an update (Version 01.00.0009g) that mitigates this vulnerability. Contact Clorius Controls A/S via email or click on their website for more information.

Pin It on Pinterest

Share This