Ecava Fixes Project Directory Hole

Thursday, January 9, 2014 @ 03:01 PM gHale

Ecava Sdn Bhd created an update that mitigates the project directory information disclosure vulnerability in the IntegraXor application, according to a report from ICS-CERT.

Ecava Sdn Bhd IntegraXor – 4.1.4360 and earlier suffer from the remotely exploitable vulnerability. ICS-CERT received the report from the Zero Day Initiative (ZDI) who got the details from security researcher “Alphazorx aka technically.screwed.”

RELATED STORIES
Advantech Fixes Hole with Upgrade
Sierra Wireless Discontinues Gateway
NovaTech DNP3 Vulnerability
Siemens COMOS Privilege Escalation

An attacker can use a crafted URL to download certain files in the project directory, compromising the confidentiality of the system.

Ecava Sdn Bhd is a Malaysia-based software development company that provides the IntegraXor SCADA product. Ecava Sdn Bhd specializes in factory and process automation solutions.

The affected product, IntegraXor, is a suite of tools used to create and run a Web-based human machine interface (HMI) for a SCADA system. IntegraXor is in several areas of process control in 38 countries with the largest installation based in the United Kingdom, United States, Australia, Poland, Canada, and Estonia.

IntegraXor does not properly restrict access to files in the project directory. An attacker may use a specially crafted URL to download project backup files from the system project directory without any authentication.

CVE-2014-0752 is the case number assigned to the vulnerability, which has a CVSS v2 base score of 7.5.

No known public exploits specifically target this vulnerability, however, an attacker with a low skill would be able to exploit this vulnerability.

Ecava Sdn Bhd issued a notification that details this vulnerability and provides mitigations to its customers. Ecava Sdn Bhd recommends users download and install the update, IntegraXor SCADA Server 4.1.4369.

For additional information, click here to view Ecava’s vulnerability note.



Leave a Reply

You must be logged in to post a comment.