'Independent security researcher RubÃ©n Santamarta has identified details and released exploit code for a Remote Procedure Call (RPC) vulnerability in Advantech/BroadWin WebAccess. This is a web browser-based human-machine interface (HMI) product. This RPC vulnerability affects the WebAccess Network Service on 4592/TCP and allows remote code execution.
'Advantech/BroadWin has notified ICS-CERT that a patch will not be issued to address this vulnerability.'
Allow me to repeat that. A simple RPC exploit in software that is used for a variety of critical infrastructure projects WILL NOT BE PATCHED.
Worse, the company continues to sell the product with absolutely no advice on its web site (visible to this writer) that there is an issue.
Well-known SCADA security expert Dale Peterson was so astonished by this action that he was moved to create a new Insecure Products List currently with just one entry.
Peterson's thoughts are on the next page.
Peterson asks, what more should be done - anyone with ideas should visit his blog entry and add their thoughts to the comment stream.
At the time of writing, two leading luminaries (Ralph Langner and Jake Brodsky) in the Control System security business have offered their thoughts, but at the moment, mostly critical of the role played by ICS-CERT.
In a posting to a members-only SCADA security discussion list (of which this writer is a member), one participant pointed out the legal concept of 'negligent enablement.' He writes, 'IMHO, the only way to incent change is to hit the wallet. A loss that is incurred where a provider was aware and willingly ignored is negligence and the financial cost to repair ought be shared. Then I bet they fix.'
Perhaps it is too difficult to patch the product, but if that were true, the product has no business continuing to be made available for sale.
Advantech has been contacted for comment.