Emerson Patches DeltaV Workstations

Thursday, August 16, 2018 @ 03:08 PM gHale

Emerson has a patch to mitigate multiple vulnerabilities in its DeltaV DCS Workstations, according to a report with NCCIC.

The vulnerabilities include an uncontrolled search path element, relative path traversal, improper privilege management and a stack-based buffer overflow.

RELATED STORIES
Philips Vulnerability Mitigation Plan
Siemens Updating Fixes for OpenSSL Hole
Siemens Fixes Automation License Manager
Siemens Updates STEP 7, WinCC Holes

Successful exploitation of these vulnerabilities –discovered by Younes Dragoni of Nozomi Networks, Ori Perez of CyberX, and Emerson – could allow arbitrary code execution, malware injection, or malware to spread to other workstations.

A Distributed Control System (DCS), DeltaV: v11.3.1, v12.3.1, v13.3.0, v13.3.1, R5 suffer from the remotely exploitable vulnerabilities.

In one vulnerability, a specially crafted DLL file may be placed in the search path and loaded as an internal and valid DLL, which may allow arbitrary code execution.

CVE-2018-14797 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 8.2.

In addition, an improper path validation may allow an attacker to replace executable files.

CVE-2018-14795 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 8.8.

Also, a non-administrative users are able to change executable and library files on the affected products.

CVE-2018-14791 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 8.2.

In addition, an open communication port could be exploited to allow arbitrary code execution.

CVE-2018-14793 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 9.6.

The product sees use mainly in the chemical and energy sectors. It also sees action on a global basis.

No known public exploits specifically target these vulnerabilities. However, an attacker with low skill level could leverage the vulnerabilities.

Emerson recommends users patch the affected products listed below:
• DeltaV DCS Versions 11.3.1, 12.3.1, 13.3.0, 13.3.1, and R5: Apply patch from vendor.
• Software patches are available to users with access to the Guardian Support Portal. Please refer to the Knowledge Base Article AK-1800- 0042 (DSN18003) for more information.
• Vulnerabilities CVE-2018-14797, CVE-2018-14795, and CVE-2018-14791 cannot be exploited if application whitelisting is implemented since it would prevent files from being overwritten.
• To limit exposure to these and other vulnerabilities, Emerson recommends deploying and configuring DeltaV systems and related components as described in the DeltaV Security Manual, which is available in Emerson’s Guardian Support Portal.



Leave a Reply

You must be logged in to post a comment.