SUBNET Solutions Fixes Software Bug

Thursday, September 12, 2013 @ 04:09 PM gHale


SUBNET Solutions Inc. created a new version that mitigates an improper input validation in its SubSTATION Server software application, according to a report on ICS-CERT.

SUBNET Solutions tested the new version to validate that it resolves the remotely exploitable vulnerability.

RELATED STORIES
Siemens SCALANCE X-200 Vulnerability
ProSoft Patches PRNG Vulnerability
Triangle MicroWorks Fixes Bug
Schneider Radio Encryption Bug

The following SUBNET Solutions Inc. products suffer from the issue:
• SubSTATION Server v2.7.0033
• SubSTATION Server v2.8.0106

Successful exploitation of this vulnerability, discovered by Adam Crain of Automatak and independent researcher Chris Sistrunk, could allow an attacker to affect the availability of the DNP3 Slave service in the SUBNET Solutions SubSTATION Server software.

SUBNET Solutions is a Canada-based company that maintains offices in Canada and the U.S. The affected product, SubSTATION Server, is a substation communication server deployed across the energy sector worldwide.

The DNP3 Slave service in SUBNET Solutions SubSTATION Server does not validate or incorrectly validates input. An attacker could introduce an unhandled exception, causing the process to crash. If settings have a configuration to automatically restart, the DNP3 Slave service will automatically restart and resume communications. Otherwise, the system must restart manually.

CVE-2013-2788 is the number assigned to this vulnerability, which has a CVSS v2 base score of 7.1.

No known public exploits specifically target this vulnerability and an attacker with a moderate skill would be able to exploit this vulnerability.

SUBNET Solutions produced a new version of SubSTATION Server that is available for download. To arrange access to a secure download of the updated version, contact SUBNET Solutions Technical Services by email at support@subnet.com or by phone at 403-270-8885.



Leave a Reply

You must be logged in to post a comment.