Privilege escalation in Trihedral Engineering Limited VTScada

Published: 2017-11-01 16:02:32
Severity Low
Patch available YES
Number of vulnerabilities 2
CVSSv2 5.3 (AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
5.3 (AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
CVSSv3 7.5 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
7.5 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE ID CVE-2017-14029
CVE-2017-14031
CWE ID CWE-427
CWE-264
Exploitation vector Local
Public exploit Not available
Vulnerable software VTScada
Vulnerable software versions VTScada 11.3.03
VTScada 11.3.02
VTScada 11.3.01
VTScada 11.3
Vendor URL Trihedral Engineering Ltd
Advisory type Public

Security Advisory

1) Privilege escalation

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists due to insecure .dll loading mechanism when opening files. A local attacker can place a file along with specially crafted .dll file and execute arbitrary code on the target system with elevated privileges.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Remediation

Update to version 11.3.05.

External links

https://ics-cert.us-cert.gov/advisories/ICSA-17-304-02

2) Privilege escalation

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists due to improper access control. A local attacker can gain elevated privileges and possibly execute arbitrary code.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Remediation

Update to version 11.3.05.

External links

https://ics-cert.us-cert.gov/advisories/ICSA-17-304-02

Back to List