CNVD-2017-33807
Vulnerability from cnvd - Published: 2017-11-14
VLAI Severity ?
Title
AutomationDirect多个产品DLL劫持漏洞
Description
AutomationDirect是全球较大的PLC设计和生产公司,CLICK、C-More和C-More Micro都是其中一款编程软件,GS Drives是一款配置软件,SL-Soft SOLO是一款温度控制器配置软件。
AutomationDirect存在多个产品DLL劫持,攻击者可以将恶意DLL重命名为符合应用程序的标准,并且应用程序不会验证该DLL是否正确。攻击者需要具有对默认安装位置的管理访问权才能安装恶意DLL。一旦由应用程序加载,DLL就可以在应用程序的特权级别运行恶意代码。
Severity
中
Patch Name
AutomationDirect多个产品DLL劫持的补丁
Patch Description
AutomationDirect是全球较大的PLC设计和生产公司,CLICK、C-More和C-More Micro都是其中一款编程软件,GS Drives是一款配置软件,SL-Soft SOLO是一款温度控制器配置软件。
AutomationDirect存在多个产品DLL劫持,攻击者可以将恶意DLL重命名为符合应用程序的标准,并且应用程序不会验证该DLL是否正确。攻击者需要具有对默认安装位置的管理访问权才能安装恶意DLL。一旦由应用程序加载,DLL就可以在应用程序的特权级别运行恶意代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
用户可联系供应商获得补丁信息: https://ics-cert.us-cert.gov/advisories/ICSA-17-313-01
Reference
https://ics-cert.us-cert.gov/advisories/ICSA-17-313-01
Impacted products
| Name | ['AutomationDirect CLICK <=2.10', 'AutomationDirect C-More <=6.30', 'AutomationDirect C-More Micro <=4.20.01.0', 'AutomationDirect GS Drives <=4.0.6', 'AutomationDirect SL-Soft SOLO <=1.1.0.5'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2017-14020"
}
},
"description": "AutomationDirect\u662f\u5168\u7403\u8f83\u5927\u7684PLC\u8bbe\u8ba1\u548c\u751f\u4ea7\u516c\u53f8\uff0cCLICK\u3001C-More\u548cC-More Micro\u90fd\u662f\u5176\u4e2d\u4e00\u6b3e\u7f16\u7a0b\u8f6f\u4ef6\uff0cGS Drives\u662f\u4e00\u6b3e\u914d\u7f6e\u8f6f\u4ef6\uff0cSL-Soft SOLO\u662f\u4e00\u6b3e\u6e29\u5ea6\u63a7\u5236\u5668\u914d\u7f6e\u8f6f\u4ef6\u3002\r\n\r\nAutomationDirect\u5b58\u5728\u591a\u4e2a\u4ea7\u54c1DLL\u52ab\u6301\uff0c\u653b\u51fb\u8005\u53ef\u4ee5\u5c06\u6076\u610fDLL\u91cd\u547d\u540d\u4e3a\u7b26\u5408\u5e94\u7528\u7a0b\u5e8f\u7684\u6807\u51c6\uff0c\u5e76\u4e14\u5e94\u7528\u7a0b\u5e8f\u4e0d\u4f1a\u9a8c\u8bc1\u8be5DLL\u662f\u5426\u6b63\u786e\u3002\u653b\u51fb\u8005\u9700\u8981\u5177\u6709\u5bf9\u9ed8\u8ba4\u5b89\u88c5\u4f4d\u7f6e\u7684\u7ba1\u7406\u8bbf\u95ee\u6743\u624d\u80fd\u5b89\u88c5\u6076\u610fDLL\u3002\u4e00\u65e6\u7531\u5e94\u7528\u7a0b\u5e8f\u52a0\u8f7d\uff0cDLL\u5c31\u53ef\u4ee5\u5728\u5e94\u7528\u7a0b\u5e8f\u7684\u7279\u6743\u7ea7\u522b\u8fd0\u884c\u6076\u610f\u4ee3\u7801\u3002",
"discovererName": "Mark Cross of RIoT Solutions",
"formalWay": "\u7528\u6237\u53ef\u8054\u7cfb\u4f9b\u5e94\u5546\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttps://ics-cert.us-cert.gov/advisories/ICSA-17-313-01",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-33807",
"openTime": "2017-11-14",
"patchDescription": "AutomationDirect\u662f\u5168\u7403\u8f83\u5927\u7684PLC\u8bbe\u8ba1\u548c\u751f\u4ea7\u516c\u53f8\uff0cCLICK\u3001C-More\u548cC-More Micro\u90fd\u662f\u5176\u4e2d\u4e00\u6b3e\u7f16\u7a0b\u8f6f\u4ef6\uff0cGS Drives\u662f\u4e00\u6b3e\u914d\u7f6e\u8f6f\u4ef6\uff0cSL-Soft SOLO\u662f\u4e00\u6b3e\u6e29\u5ea6\u63a7\u5236\u5668\u914d\u7f6e\u8f6f\u4ef6\u3002\r\n\r\nAutomationDirect\u5b58\u5728\u591a\u4e2a\u4ea7\u54c1DLL\u52ab\u6301\uff0c\u653b\u51fb\u8005\u53ef\u4ee5\u5c06\u6076\u610fDLL\u91cd\u547d\u540d\u4e3a\u7b26\u5408\u5e94\u7528\u7a0b\u5e8f\u7684\u6807\u51c6\uff0c\u5e76\u4e14\u5e94\u7528\u7a0b\u5e8f\u4e0d\u4f1a\u9a8c\u8bc1\u8be5DLL\u662f\u5426\u6b63\u786e\u3002\u653b\u51fb\u8005\u9700\u8981\u5177\u6709\u5bf9\u9ed8\u8ba4\u5b89\u88c5\u4f4d\u7f6e\u7684\u7ba1\u7406\u8bbf\u95ee\u6743\u624d\u80fd\u5b89\u88c5\u6076\u610fDLL\u3002\u4e00\u65e6\u7531\u5e94\u7528\u7a0b\u5e8f\u52a0\u8f7d\uff0cDLL\u5c31\u53ef\u4ee5\u5728\u5e94\u7528\u7a0b\u5e8f\u7684\u7279\u6743\u7ea7\u522b\u8fd0\u884c\u6076\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "AutomationDirect\u591a\u4e2a\u4ea7\u54c1DLL\u52ab\u6301\u7684\u8865\u4e01",
"products": {
"product": [
"AutomationDirect CLICK \u003c=2.10",
"AutomationDirect C-More \u003c=6.30",
"AutomationDirect C-More Micro \u003c=4.20.01.0",
"AutomationDirect GS Drives \u003c=4.0.6",
"AutomationDirect SL-Soft SOLO \u003c=1.1.0.5"
]
},
"referenceLink": "https://ics-cert.us-cert.gov/advisories/ICSA-17-313-01",
"serverity": "\u4e2d",
"submitTime": "2017-11-13",
"title": "AutomationDirect\u591a\u4e2a\u4ea7\u54c1DLL\u52ab\u6301\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…