Newport Clears Controller Issue

Tuesday, June 27, 2017 @ 02:06 PM gHale


Newport will address an improper authentication vulnerability in its XPS-Cx, XPS-Qx products in the next generation, according to a report with ICS-CERT.

Successful exploitation of this remotely exploitable vulnerability, discovered by Maxim Rupp, may allow an attacker to view and edit settings without authenticating by accessing a specific uniform resource locator (URL).

RELATED STORIES
Siemens Mitigates XHQ Vulnerability
Siemens Clears SIMATIC Hole
Ecava Fixes IntegraXor Vulnerability
Siemens Authentication Bypass Update

The following versions of XPS-Cx and XPS-Qx, a universal motion controller, are affected:
• XPS-Cx all versions
• XPS-Qx all versions

No known public exploits specifically target this vulnerability. However, an attacker with low skill level could leverage the vulnerability.

An attacker may bypass authentication by accessing a specific uniform resource locator (URL).

CVE-2017-7919 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 7.5.

The products see use in the critical manufacturing sector and it sees use on a global basis.

Newport reports this issue will be addressed in the next generation XPS-Dx controller.

Newport recommenda users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:
• Not connect control components and control networks to an open network such as the Internet or an office network. Newport recommends putting control components and control networks behind a firewall.
• Limit physical and electronic access to all automation components to authorized personnel only.
• Change the default passwords before first use. This will reduce the risk of unauthorized access to systems.
• Regularly change passwords. This will reduce the risk of unauthorized access to systems.
• If remote access to control components and control networks is required, use a Virtual Private Network (VPN).
• Regularly perform threat analyses. Check whether the measures taken meet company security requirements.
• Use “defense-in-depth” mechanisms in the system’s security configuration to restrict the access to and control of individual products and networks.
• Minimize network exposure for all control system devices and/or systems and ensure that they are not accessible from the Internet.
• Locate control system networks and remote devices behind firewalls and isolate them from the business network.



Leave a Reply

You must be logged in to post a comment.