Severe Flaws Found in Yokogawa Switches, Control Systems
24.8.18 securityweek ICS
Japanese electrical engineering company Yokogawa published two security advisories last week to inform customers that some of its products are affected by serious vulnerabilities.
One of the flaws, for which ICS-CERT also published an advisory, is CVE-18-0651, a high severity stack-based buffer overflow affecting the license management function present in some products.
Sending specially crafted data to the licensing function could cause it to stop, but users have been warned that an unprivileged attacker with network access to the targeted system may also be able to exploit the flaw for arbitrary code execution.
According to Yokogawa and ICS-CERT, the security hole impacts the ASTPLANNER production scheduling software, the TriFellows package for the CENTUM CS control system, STARDOM control systems, and the iDefine functional safety management tool for the ProSafe-RS process safety system.
Yokogawa has already released a patch for STARDOM controllers and it plans on issuing a fix for iDefine. ASTPLANNER and TriFellows customers have been advised to contact the company’s support team.
The second vulnerability, which impacts more than a dozen of Yokogawa’s Vnet/IP industrial switches, has also been classified as “high severity,” but no CVE identifier has been assigned.
The flaw affects the debugging functionality of these devices. The problem is related to the tcpdump command, which is used for monitoring and analyzing network traffic. The tcpdump command is disabled by default, but if users have enabled it, an unprivileged network attacker could use it to disrupt the connection or make changes to the switch’s configuration.
A few months ago, Yokogawa informed users that it released a firmware update for its STARDOM controllers to address a critical hardcoded credentials vulnerability that can be exploited remotely to take control of a device.