09 October 2020

KLCERT-20-015: Remote Code Execution in ARC Informatique PcVue

Vendor

ARC Informatique

Researcher

Andrey Muravitsky, Senior Security Researcher, Kaspersky ICS CERT

Timeline

Timeline

  • Kaspersky ICS CERT advisory published

    09 October 2020

  • Vendor advisory published

    October 2020

Description

A Remote Code Execution vulnerability exists in PcVue from version 8.10 onward, due to the unsafe deserialization of messages received on the interface.

Exploitability

Remotely

Attack complexity

Low

User interaction

None

Impact

Execution of an arbitrary process on the Web & Mobile back end server

Existence of exploit

PoC

Affected products

ARC Informatique PcVue 8.10 (including) through 12.0.17 (excluding)

Mitigation

Vendor mitigation

Vendor provided detailed information for mitigation in the security bulletin SB2020-1 (login required). Download this document and follow the step by step instructions: https://www.pcvuesolutions.com/support/index.php/en/security-bulletin/1076-security-bulletin-2020-1
The user must be logged in to access the security notification.
Vendor’s security alert list: https://www.pcvuesolutions.com/security

Kaspersky Lab publishes information on newly identified vulnerabilities in order to raise user awareness of the IT security threats detected. Kaspersky Lab does not make any guarantees in respect of information received from vendors of products in which vulnerabilities have been identified, which is included in the following sections of the advisory: Affected Products, Vendor Mitigation.

Timeline

  • Kaspersky ICS CERT advisory published

    09 October 2020

  • Vendor advisory published

    October 2020