
The vulnerabilities are a debug service enabled by default (VU#362332) and a weak hashing algorithm used in authentication (VU#840249). ICS-CERT is coordinating with Siemens CERT, CERT/CC, Microsoft, and other groups both domesticallyĪ security researcher has identified two vulnerabilities affecting the Wind River Systems’ VxWorks platform. The full capabilities of the malware and intent or results of the queries are not yet known. ICS-CERT has confirmed the malware installs a trojan that interacts with installed SIMATIC® WinCC or SIMATIC® Siemens STEP 7 software and then makes queries to any discovered SIMATIC® databases. Microsoft has also released a Security Advisory (2286198)c detailing the previously unknown vulnerability. US-CERT has released a Vulnerability Noteb detailing the vulnerability and suggested workarounds. The malware utilizes this zero-day vulnerability and exploits systems after users open a USB drive with a file manager capable of displaying icons (like Windows Explorer). VirusBlokAda, an antivirus vendor based in Belarus, announceda the discovery of malware that uses a zero-day vulnerability in Microsoft Windows processing of shortcut files. USB Malware Targeting Siemens Control Software (Update C) Successful exploitation of any of these vulnerabilities could result in a malicious user taking complete control over an affected device. The following vulnerabilities have been identified: default credentials, privilege escalation, unauthorized information interception, and unauthorized information access.

These vulnerabilities also affect the legacy Richards-Zeta Mediator products. ICS-CERT has no information to indicate that these infections have specifically targeted United States Critical Infrastructure and Key Resources (CIKR), or any specific sector or organization.Ī cross-site scriptinga vulnerability exists in the system used by the ABB Electrical Distribution Management System (DMS) product netCADOPS to generate online Help.Ĭisco has identified multiple security vulnerabilitiesa in the Cisco Network Building Mediator (NBM) products. ICS-CERT has received reports and investigated infections of the Mariposaa botnet, which have affected the business networks of multiple control system owners in recent months. Rockwell Automation has identified a security vulnerability in the programming and configuration client software authentication mechanism employed by certain versions of the PLC-5 and SLC 5/0x family of programmable controllers.

Rockwell PLC5/SLC5/0x/RSLogix Security Vulnerability This vulnerability is likely exploitable however, significant user interaction would be required. Rockwell Automation RSLinx Classic EDS Vulnerability (Update A)Ī buffer overflow vulnerability exists in the Rockwell Automation RSLinx Classic EDS Hardware Installation Tool (RSHWare.exe).
