Several thousands of critical infrastructure may still be vulnerable to SCADA flaws public disclosed this week. It has been estimated that more than 7,600 different chemicals, power and petrochemical plants are affected by the bugs disclosed by security researcher at Rapid 7 in Yokogawa Electric’s CENTUM CS3000 R3 product. The Windows software affected by the flaws designed by Yokogawa was on the market since 1998 and is largely diffused within the European and Asian infrastructure, including power plants, airports and similar facilities. All of the bugs affect CENTUM CS 3000 software used for industrial control systems. The security expert at Rapid7, Juan Vazquez, and independent security researcher Julian Vilas Diaz discovered the bugs and presented their findings in a talk “Kicking SCADA Around” last weekend at the RootedCON conference in Madrid, Spain successively they published a blog post including technical details about three vulnerabilities. The flaw discovered by the researchers are buffer overflows, heap based and stack based, that could be exploited by attackers to sabotage the Yokogawa application. The first flaw discovered by researchers allows DoS and the execution of arbitrary code with system privileges just sending specially crafted packets to BKCLogSvr.exe to trigger a heap based buffer overflow.
The second vulnerability is quite similar to the previous one, sending a specially crafted packet to BKHOdeq.exe is possible to cause a stack based buffer overflow, allowing “execution of arbitrary code with the privileges of the CENTUM user.” The third vulnerability is a stack based buffer overflow, which affect the BKBCopyD.exe service, could allow the execution of arbitrary code. “The vulnerabilities have been found in the version R3.08.50:
Rapid 7 firms ethically disclosed the vulnerabilities to Japanese Yokogawa firm back in December, only last week its experts published an advisory on the vulnerabilities. The Japanese Yokogawa invites its customers who use CENTUM CS 300 to immediately update to the latest version of the application (R3.09.50) and patching it to resolve the vulnerabilities.
(Security Affairs – SCADA, Yokogawa, Critical infrastructure)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.