Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Security Management //

Patch Management

9/17/2018
09:35 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

Fuji's Electric V-Server Susceptible to Numerous Vulnerabilities

Another industrial control system is shown to have a series of serious flaws. This time, it's Fuji's Electric V-Server, according to warnings from ICS-CERT.

Fuji's Electric V-Server is in some heap of trouble.

An advisory from ICS-CERT enumerates several code vulnerabilities in the industrial control system's (ICS) data collection and management service. V-Server VPR 4.0.3.0, as well as prior versions, are reported to be affected.

The vulnerabilities include use-after-free, untrusted pointer dereference, heap-based buffer overflow, out-of-bounds write, integer underflow, out-of-bounds read and stack-based buffer overflow.

(Source: ENISA)
(Source: ENISA)

These numerous vulnerabilities could leads to distributed denial-of-service (DDoS) attacks or possible information disclosure to an attacker.

Boy howdy, some heap of trouble indeed.

ICS-CERT also warned that public exploits are available for some of the vulnerabilities.

The CVSS base score for the faults has been calculated as 7.3 -- a "high severity" rating. This means they are important, but not deemed immediately critical to operations.

However, Fuji says that all the vulnerabilities have been patched with the release of version 4.0.4.0.

The first reporting of the problem is credited to Trend Micro's Zero Day Initiative (ZDI) with the research conducted by Steven Seeley of Source Incite.

In the advisory published by ZDI, researchers note that first disclosure to the manufacturer was sent in March. The coordinated public release of advisory was released September 12.

The advisory notes that the problem "exist within the parsing of a VPR file." With the bad parsing, either the lack of validating the existence of an object prior to performing operations on that object, or the lack of proper validation for user-supplied data causes some of the issues.

An additional advisory from ICS-CERT describes a high severity buffer overflow, which affects V-Server Lite. The problem is open to exportation for code execution -- leading to a DDoS condition or information leakage once again -- using specially crafted project files.

Even with the new software installed, the National Cybersecurity & Communications Integration Center (NCCIC) recommends users take defensive measures to minimize the risk of exploitation of this vulnerability.

Specifically, the following concepts should be considered when looking at the ICS system as a whole:

  • Minimize network exposure for all control system devices or systems, and ensure that they are not accessible from the Internet.
  • Locate control system networks and remote devices behind firewalls, and isolate them from the business network.
  • When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also, it must be recognized that a VPN is only as secure as the connected devices.

The security team must always be aware how easy it is to get to ICS systems from a non-secure corporate perimeter. The usual reason is misconfiguration.

Positive Technologies found in a report that 73% of studied corporate networks allowed penetration by some means. Weak passwords, along with vulnerable software and operating systems, as well as flaws in network segmentation -- no DMZ -- and traffic filtering were the most commonly found issues.

Related posts:

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Data Breaches Affect the Enterprise
Data breaches continue to cause negative outcomes for companies worldwide. However, many organizations report that major impacts have declined significantly compared with a year ago, suggesting that many have gotten better at containing breach fallout. Download Dark Reading's Report "How Data Breaches Affect the Enterprise" to delve more into this timely topic.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31787
PUBLISHED: 2021-11-30
The Bluetooth Classic implementation on Actions ATS2815 chipsets does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service and shutdown of a device by flooding the target device with LMP_features_res packets.
CVE-2021-40101
PUBLISHED: 2021-11-30
An issue was discovered in Concrete CMS before 8.5.7. The Dashboard allows a user's password to be changed without a prompt for the current password.
CVE-2021-4026
PUBLISHED: 2021-11-30
bookstack is vulnerable to Improper Access Control
CVE-2021-42564
PUBLISHED: 2021-11-30
An open redirect through HTML injection in confidential messages in Cryptshare before 5.1.0 allows remote attackers (with permission to provide confidential messages via Cryptshare) to redirect targeted victims to any URL via the '<meta http-equiv="refresh"' substring in the editor para...
CVE-2021-43320
PUBLISHED: 2021-11-30
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-41244. Reason: This candidate is a reservation duplicate of CVE-2021-41244. Notes: All CVE users should reference CVE-2021-41244 instead of this candidate. All references and descriptions in this candidate have been removed to preve...