Lantech Vulnerabilities Remain Open

Thursday, May 3, 2018 @ 04:05 PM gHale

Lantech’s IDS 2102 suffers from an improper input validation and a stack-based buffer overflow vulnerabilities for which there no mitigations yet, according to a report with NCCIC.

Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code on the system through crafting malicious input.

RELATED STORIES
InduSoft, InTouch Hole Patched
ICS Spectre, Meltdown Update Part V
WECON Mitigates HMI Holes
Delta Electronics Mitigation Plan for PMSoft

IDS 2102 versions 2.0 and prior suffer from the remotely exploitable issues discovered by Florian Adamsky.

Nearly all input fields allow for arbitrary input on the device.

CVE-2018-8869 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 9.8.

In addition, there is a stack-based buffer overflow vulnerability that may allow remote code execution.

CVE-2018-8865 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 9.8.

The product sees use mainly in the critical manufacturing sector. An attacker with low skill level could leverage the vulnerabilities. The product sees action mainly in North America, Europe, Australia, and China.

No known public exploits specifically target these vulnerabilities.

Taiwan-based Lantech has been unresponsive to NCCIC.

In order to be protected NCCIC recommends users take defensive measures to minimize the risk of exploitation. Specifically, users should:
• Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet.
• Locate control system networks and remote devices behind firewalls, and isolate them from the business network.
• When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.



Leave a Reply

You must be logged in to post a comment.