Home Business IT Security Critical Infrastructure exploitable vulnerability will not be patched
×

Warning

JUser: :_load: Unable to load user with ID: 3018

Critical Infrastructure exploitable vulnerability will not be patched

  • 09 November 2011
  • Written by 
  • Published in Security

In April this year, a vulnerability was discovered in a commonly used critical infrastructure Web Access product.  Exploitable code was also made available.  The manufacturer has announced that no patch will be released.

According to ISC-CERT, advisory ICSA-11-094-02A spells out the following:

'Independent security researcher Rubén Santamarta has identified details and released exploit code for a Remote Procedure Call (RPC) vulnerability in Advantech/BroadWin WebAccess. This is a web browser-based human-machine interface (HMI) product. This RPC vulnerability affects the WebAccess Network Service on 4592/TCP and allows remote code execution.

'Advantech/BroadWin has notified ICS-CERT that a patch will not be issued to address this vulnerability.'

Allow me to repeat that.  A simple RPC exploit in software that is used for a variety of critical infrastructure projects WILL NOT BE PATCHED.

Worse, the company continues to sell the product with absolutely no advice on its web site (visible to this writer) that there is an issue.

Well-known SCADA security expert Dale Peterson was so astonished by this action that he was moved to create a new Insecure Products List currently with just one entry.

Peterson's thoughts are on the next page.


Peterson's company Digital Bond, specialists in Control System security has a blog posting where Peterson observes, 'DHS recent stance that insecure by design products, even those that are remotely exploitable because they lack any security controls, are not going to be considered vulnerabilities makes it difficult for them to come down hard on Advantech or any other product that has known exploits. Still it seems like more should be done than a one line update in an advisory.'

Peterson asks, what more should be done - anyone with ideas should visit his blog entry and add their thoughts to the comment stream.

At the time of writing, two leading luminaries (Ralph Langner and Jake Brodsky) in the Control System security business have offered their thoughts, but at the moment, mostly critical of the role played by ICS-CERT.

In a posting to a members-only SCADA security discussion list (of which this writer is a member), one participant pointed out the legal concept of 'negligent enablement.'  He writes, 'IMHO, the only way to incent change is to hit the wallet.  A loss that is incurred where a provider was aware and willingly ignored is negligence and the financial cost to repair ought be shared.  Then I bet they fix.'

Perhaps it is too difficult to patch the product, but if that were true, the product has no business continuing to be made available for sale.

Advantech has been contacted for comment.

LEARN HOW TO BE A SUCCESSFUL MVNO

Did you know: 1 in 10 mobile services in Australia use an MVNO, as more consumers are turning away from the big 3 providers?

The Australian mobile landscape is changing, and you can take advantage of it.

Any business can grow its brand (and revenue) by adding mobile services to their product range.

From telcos to supermarkets, see who’s found success and learn how they did it in the free report ‘Rise of the MVNOs’.

This free report shows you how to become a successful MVNO:

· Track recent MVNO market trends
· See who’s found success with mobile
· Find out the secret to how they did it
· Learn how to launch your own MVNO service

DOWNLOAD NOW!