Operating System:

[Win]

Published:

17 February 2013

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2013.0218
             Schneider Electric Accutech Manager Heap Overflow
                             18 February 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Schneider Electric Accutech Manager
Publisher:         US-CERT
Operating System:  Windows
Impact/Access:     Administrator Compromise -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2013-0658  

Original Bulletin: 
   http://ics-cert.us-cert.gov/pdf/ICSA-13-043-01.pdf

Comment: Exploit code for a remotely exploitable administrator compromise has 
         been made publicly available. A patch is available from the vendor.

- --------------------------BEGIN INCLUDED TEXT--------------------

ICS-CERT ADVISORY

ICSA-13-043-01-SCHNEIDER ELECTRIC ACCUTECH MANAGER HEAP OVERFLOW

February 12, 2013

OVERVIEW

This advisory provides mitigation details for a vulnerability that impacts the 
Schneider Electric Accutech Manager.

Independent researcher Aaron Portnoy of Exodus Intelligence [a] has identified 
a heap-based buffer overflow vulnerability in Schneider Electric's Accutech 
Manager application. Schneider Electric has produced an update that mitigates 
this vulnerability. This researcher has tested the update and verified that it 
fixes the vulnerability. Exploitation of this vulnerability could allow an 
attacker to execute code with administrator privileges. This vulnerability 
could affect the energy, water and wastewater, and critical manufacturing 
sectors.

This vulnerability could be exploited remotely.

Exploit code for this vulnerability has recently been published by another 
researcher who was not part of any coordinated effort with the vendor, 
ICS-CERT, or Exodus Intelligence.

Affected Products

The following Schneider Electric versions are affected: 
* Accutech Manager 2.00.1 and older.

Impact

This buffer overflow will cause the Accutech Manager application to crash and 
could be exploited to allow an attacker to execute arbitrary code with 
administrator privilege. Because this vulnerability can be exploited remotely, 
there is a potential for an attacker to gain control of the host computer.

Impact to individual organizations depends on many factors that are unique to 
each organization. ICS-CERT recommends that organizations evaluate the impact 
of this vulnerability based on their operational environment, architecture, 
and product implementation.

Background

Schneider Electric is a Europe-based company that maintains offices in 190 
countries worldwide. Their products address various markets including 
renewable energy, process control, monitoring and control, motor controls, 
lighting controls, electrical distribution, and security systems.

The affected product, Accutech Manager, is a management component of a network-
based sensor monitoring system. Accutech Manager is used in applications where 
remote sensor data are gathered, monitored, displayed, and archived over time. 
It can be used in a broad range of low-level applications ranging from long-
term multi-sensor monitoring on a large network to single PC implementations 
for technicians.

According to Schneider Electric, Accutech Manager is deployed across several 
sectors including energy, water and wastewater, and critical manufacturing.

VULNERABILITY CHARACTERISATION

Vulnerability Overview

Heap-Based Buffer Overflow [b]
The RFManagerService.exe process binds to Ports 2536/TCP and 2537/TCP by 
default. By sending an HTTP request outside the bounds of the buffer to Port 
2537/TCP, an attacker can cause a heap-based buffer resulting in loss of 
confidentiality, integrity, and availability.

CVE-2013-0658 [c] has been assigned to this vulnerability. ICS-CERT has 
assigned a base CVSS score of 10.0; the CVSS vector string is: 
(AV:N/AC:L/Au:N/C:C/I:C/A:C). [d]

Vulnerability Details

Exploitability
This vulnerability could be exploited remotely.

Existence of Exploit
Exploit code for this vulnerability has been recently published.

Difficulty
An attacker with a low skill would be able to exploit this vulnerability.

MITIGATION

Schneider Electric has released an update [e] that mitigates this 
vulnerability. The researcher has tested the update and verified that it fixes 
the vulnerability.

This update is available at the Schneider Electric Website:

http://www.schneider-electric.com/download/ww/en/results/0/1555898-Software--Released/28460036-Accutech/

Schneider Electric also recommends that users implement the following steps 
until the update can be applied.

* Close the Accutech Manager software tool's server component when not in use.
* Obtain guidance from Schneider Electric's cybersecurity recommendations Web 
  page. [f]
* Check with Schneider Electric, and apply the maintenance update as soon as 
  it becomes available.

One specific strategy that can mitigate the risk associated with the 
vulnerability is to ensure that the vulnerable port (2537/TCP) is not 
accessible from the Internet.

ICS-CERT encourages asset owners to take additional defensive measures to 
protect against this and other cybersecurity risks.

* Minimize network exposure for all control system devices. Critical devices 
  should not directly face the Internet.
* Locate control system networks and remote devices behind firewalls, and 
  isolate them from the business network.
* When remote access is required, use secure methods, such as Virtual Private 
  Networks (VPNs), recognizing that VPN is only as secure as the connected 
  devices.

ICS-CERT also provides a section for control systems security recommended 
practices on the US-CERT Web page. Several recommended practices are available 
for reading and download, including Improving Industrial Control Systems 
Cybersecurity with Defense-in-Depth Strategies. [g] ICS-CERT reminds 
organizations to perform proper impact analysis and risk assessment prior to 
taking defensive measures.

Additional mitigation guidance and recommended practices are publicly 
available in the ICS-CERT Technical Information Paper, ICS-TIP-12-146-01B-
Targeted Cyber Intrusion Mitigation Strategies, [h] available for download 
from the ICS-CERT Web page (www.ics-cert.org).

Organizations observing any suspected malicious activity should follow their 
established internal procedures and report their findings to ICS-CERT for 
tracking and correlation against other incidents.

ICS-CERT CONTACT

For any questions related to this report, please contact ICS-CERT at:

Email: ics-cert@hq.dhs.gov 
Toll Free: 1-877-776-7585 
For industrial control systems security information and incident reporting: 
www.ics-cert.org

REFERENCES

[a] Exodus Intelligence - https://www.exodusintel.com/, Web site last 
    accessed February 12, 2013.
[b] CWE, http://cwe.mitre.org/data/definitions/122.html, CWE-122: Heap-based 
    Buffer Overflow, Web site last accessed February 12, 2013. 
[c] NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0658, NIST 
    uses this advisory to create the CVE Web site report. This Web site will 
    be active sometime after publication of this advisory.
[d] CVSS Calculator, 
    http://nvd.nist.gov/cvss.cfm?version=2&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C) 
    Web site last visited February 12, 2013.
[e] Schneider Electric Download Link, 
    http://www.schneider-electric.com/download/ww/en/results/0/1555898-Software--Released/28460036-Accutech 
    Web site last accessed February 12, 2013. 
[f] Vendor's security recommendations - 
    http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page 
    Web site last accessed February 12, 2013.
[g] CSSP Recommended Practices, 
    http://www.us-cert.gov/control_systems/practices/Recommended_Practices.html 
    Web site last accessed February 12, 2013.
[h] Cyber Intrusion Mitigation Strategies, 
    http://www.us-cert.gov/control_systems/pdf/ICS-TIP-12-146-01B.pdf, Web 
    site last accessed February 12, 2013.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=kes4
-----END PGP SIGNATURE-----