09 February 2018

KLCERT-18-001: Saperion webclient multiple vulnerabilities: Remote Code Execution with system user privileges in Saperion web client

Vendor

Saperion

Timeline

Timeline

  • Kaspersky ICS CERT advisory published

    12 February 2018

  • Vendor refused to release security patch

    11 January 2018

  • Vulnerabilities reported

    08 August 2017

Description

Remote exploitation of discovered vulnerabilities lead to full compromise the system with Saperion webclient.

Exploitability

Remotely

Attack complexity

Low

User interaction

None

Impact

An unauthenticated attacker may be able to exploit vulnerability and cause to remote code execution with the privilege of the system user on Windows OS and with the privilege of www-data on Linux OS.

Existence of exploit

Unknown

Affected products

SAPERION Web Client version 7.5.2 83166

Mitigation

Vendor mitigation

N/A

Kaspersky Lab mitigation

Please use an intrusion detection system and dedicated systems designed to protect the network perimeter on industrial networks, as well as implementing tools that protect web servers and applications (web application firewall), restricting access to the vulnerable web application from the Internet and from networks adjacent to the ICS network.

Kaspersky Lab publishes information on newly identified vulnerabilities in order to raise user awareness of the IT security threats detected. Kaspersky Lab does not make any guarantees in respect of information received from vendors of products in which vulnerabilities have been identified, which is included in the following sections of the advisory: Affected Products, Vendor Mitigation.

Timeline

  • Kaspersky ICS CERT advisory published

    12 February 2018

  • Vendor refused to release security patch

    11 January 2018

  • Vulnerabilities reported

    08 August 2017