ABB’s SREA-01, SREA-50 Patched

Thursday, August 10, 2017 @ 03:08 PM gHale


An update is available to mitigate a relative path traversal vulnerability in ABB’s SREA-01 and SREA-50 products, according to a report with ICS-CERT.

An attacker who successfully exploits this vulnerability could access files on the affected products’ file systems, view data, change configuration, retrieve password hash codes, and potentially insert and send commands to connected devices without authorization. Bertin Jose and Fernandez Ezequiel discovered the vulnerability.

RELATED STORIES
Fuji Fixes Electric Monitouch V-SFT
Hole in Solar Controls WATTConfig M Software
Hole in Solar Controls HC Downloader
Hole in SIMPlight SCADA Software

The vulnerability affects the following SREA-01 and SREA-50 legacy remote monitoring tools and Ethernet adapters:
• SREA-01 revisions A, B, C: application versions up to 3.31.5
• SREA-50 revision A: application versions up to 3.32.8

In the vulnerability, an attacker may access internal files of the affected products without any authorization over the network, using a HTTP request which refers to files using ../../ relative paths.

Once the internal password file ends up retrieved, the password hash can be identified using a brute force attack. There is also an exploit allowing running of commands after authorization.

CVE-2017-9664 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 9.8.

The products see action in the critical manufacturing and energy sectors. They also see use on a global basis.

HMS Industrial Networks Ab created an update to resolve a publicly reported vulnerability in the ABB products. Products are based on a legacy software platform which is no longer actively maintained. The problem is corrected by installing a patch.

ABB has tested the patch only with the latest revisions of the SREA-01. The patch should also be applicable to the latest revisions of the SREA-50. If an old revision of hardware is in use, it is suggested to replace the hardware either with latest revision or with some other remote monitoring tool.



Leave a Reply

You must be logged in to post a comment.