June 27, 2022

TheCyberThrone

Thinking Security ! Always

Open Automation Software Platform Patches numerous vulnerabilities

Numerous vulnerabilities have been found in the Open Automation Software Platform that could allow an attacker to carry out a variety of malicious actions.

The platform connects industrial devices, servers, files, databases, and IoT devices to provide supervisory control and data acquisition systems or industrial automation solutions. The platform is used by large companies in the defense, aerospace, healthcare, water, energy, and vehicle manufacturing.

Advertisements

The eight vulnerabilities open the door to a wide range of possible attacks. The most serious of the vulnerabilities, named CVE-2022-26082, would allow an attacker to gain the ability to execute arbitrary code on the targeted machine. Another vulnerability, CVE-2002-26833, could lead to the unauthenticated use of the REST API.

Two of the vulnerabilities, CVE-2022-27169 and 2022-26067, could allow an attacker to obtain a directory listing at any location permissible by the underlying user by sending a specific network request. CVE-2022-26077 works similarly but provides the attacker with a list of usernames and passwords for the platform that could be used in future attacks.

The remaining vulnerabilities include CVE-2022-26026, which can be triggered by a crafted network request and leads to a denial of service and loss of communications. The last two vulnerabilities could allow an attacker to make external configuration changes and create new user accounts.

A patch has been released by the platform owners to address them, which users should install if they haven’t already. It’s also noted that affected users could mitigate the issues by ensuring proper network segmentation is in place.

Advertisements

Since this software is used by large organizations in critical industries, it not only opens the door to casual hackers but also to nation-state-sponsored actors who may have far more malicious intent.

%d bloggers like this: