Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Security Management //

Patch Management

// // //
9/17/2018
09:35 AM
Larry Loeb
Larry Loeb
Larry Loeb

Fuji's Electric V-Server Susceptible to Numerous Vulnerabilities

Another industrial control system is shown to have a series of serious flaws. This time, it's Fuji's Electric V-Server, according to warnings from ICS-CERT.

Fuji's Electric V-Server is in some heap of trouble.

An advisory from ICS-CERT enumerates several code vulnerabilities in the industrial control system's (ICS) data collection and management service. V-Server VPR 4.0.3.0, as well as prior versions, are reported to be affected.

The vulnerabilities include use-after-free, untrusted pointer dereference, heap-based buffer overflow, out-of-bounds write, integer underflow, out-of-bounds read and stack-based buffer overflow.

(Source: ENISA)
(Source: ENISA)

These numerous vulnerabilities could leads to distributed denial-of-service (DDoS) attacks or possible information disclosure to an attacker.

Boy howdy, some heap of trouble indeed.

ICS-CERT also warned that public exploits are available for some of the vulnerabilities.

The CVSS base score for the faults has been calculated as 7.3 -- a "high severity" rating. This means they are important, but not deemed immediately critical to operations.

However, Fuji says that all the vulnerabilities have been patched with the release of version 4.0.4.0.

The first reporting of the problem is credited to Trend Micro's Zero Day Initiative (ZDI) with the research conducted by Steven Seeley of Source Incite.

In the advisory published by ZDI, researchers note that first disclosure to the manufacturer was sent in March. The coordinated public release of advisory was released September 12.

The advisory notes that the problem "exist within the parsing of a VPR file." With the bad parsing, either the lack of validating the existence of an object prior to performing operations on that object, or the lack of proper validation for user-supplied data causes some of the issues.

An additional advisory from ICS-CERT describes a high severity buffer overflow, which affects V-Server Lite. The problem is open to exportation for code execution -- leading to a DDoS condition or information leakage once again -- using specially crafted project files.

Even with the new software installed, the National Cybersecurity & Communications Integration Center (NCCIC) recommends users take defensive measures to minimize the risk of exploitation of this vulnerability.

Specifically, the following concepts should be considered when looking at the ICS system as a whole:

  • Minimize network exposure for all control system devices or systems, and ensure that they are not accessible from the Internet.
  • Locate control system networks and remote devices behind firewalls, and isolate them from the business network.
  • When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also, it must be recognized that a VPN is only as secure as the connected devices.

The security team must always be aware how easy it is to get to ICS systems from a non-secure corporate perimeter. The usual reason is misconfiguration.

Positive Technologies found in a report that 73% of studied corporate networks allowed penetration by some means. Weak passwords, along with vulnerable software and operating systems, as well as flaws in network segmentation -- no DMZ -- and traffic filtering were the most commonly found issues.

Related posts:

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Machine Learning, AI & Deep Learning Improve Cybersecurity
Machine intelligence is influencing all aspects of cybersecurity. Organizations are implementing AI-based security to analyze event data using ML models that identify attack patterns and increase automation. Before security teams can take advantage of AI and ML tools, they need to know what is possible. This report covers: -How to assess the vendor's AI/ML claims -Defining success criteria for AI/ML implementations -Challenges when implementing AI
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-30935
PUBLISHED: 2022-09-28
An authorization bypass in b2evolution allows remote, unauthenticated attackers to predict password reset tokens for any user through the use of a bad randomness function. This allows the attacker to get valid sessions for arbitrary users, and optionally reset their password. Tested and confirmed in...
CVE-2022-32166
PUBLISHED: 2022-09-28
In ovs versions v0.90.0 through v2.5.0 are vulnerable to heap buffer over-read in flow.c. An unsafe comparison of “minimasks� function could lead access to an unmapped region of memory. This vulnerability is capable of crashing the software, memory modification...
CVE-2022-32169
PUBLISHED: 2022-09-28
The “Bytebaseâ€� application does not restrict low privilege user to access “admin issues“ for which an unauthorized user can view the “OPENâ€� and “CLOSEDâ€&...
CVE-2022-32170
PUBLISHED: 2022-09-28
The “Bytebase� application does not restrict low privilege user to access admin “projects“ for which an unauthorized user can view the “projects“ created by “Admin&ac...
CVE-2022-32168
PUBLISHED: 2022-09-28
Notepad++ versions 8.4.1 and before are vulnerable to DLL hijacking where an attacker can replace the vulnerable dll (UxTheme.dll) with his own dll and run arbitrary code in the context of Notepad++.