U.S. Flag Official website of the Department of Homeland Security
U.S. Department of Homeland Security Seal. ICS-CERT. Industrial Control Systems Cyber Emergency Response Team.
TLP:WHITE

Advisory (ICSA-10-316-01A)

Intellicom NetBiter WebSCADA Vulnerabilities (Update A)

Original release date: December 15, 2010 | Last revised: January 21, 2014

Legal Notice

All information products included in http://ics-cert.us-cert.gov are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see http://www.us-cert.gov/tlp/.



OVERVIEW

This advisory is a follow-up to ICS-ALERT-10-293-01 - Intellicom NetBiter WebSCADA Vulnerabilities, published on the ICS-CERT Web page on October 20, 2010.

On October 1, 2010 independent researchers identified vulnerabilities in the Intellicom NetBiter Supervisory Control and Data Acquisition (SCADA) applications. A directory traversal vulnerability is present in all affected devices that lead to local file disclosure. The ability to upload malicious web content using a custom logo page is also possible. All of the reported vulnerabilities require superadmin privileges. If the default password is not changed, the vulnerability can be leveraged to gain additional access to an affected device’s file system.

--------- Begin Update A Part 1 of 2 --------

Intellicom has released a software update that limits the ability to read system files and eliminates the ability to perform directory traversals.

--------- End Update A Part 1 of 2 --------

AFFECTED PRODUCTS

Intellicom NetBiter products based on the NB100 and NB200 platforms, including:

  • WebSCADA (WS100)
  • WebSCADA (WS200)
  • Easy Connect (EC150)
  • Modbus RTU – TCP Gateway (MB100)
  • Serial Ethernet Server (SS100).

IMPACT

A user with superadmin privileges (highest authentication level) has permission to read system files. Local configuration files can be accessed which may allow an attacker to research other potential attack vectors. The risk also exists for an attacker to execute arbitrary commands by uploading malicious code.

Impact to individual organizations depends on many factors that are unique to each organization. The ICS-CERT recommends that organizations evaluate the impact of this vulnerability based on their environment, architecture, and product implementation.

BACKGROUND

According to their web site,  IntelliCom NetBiter products have been deployed in over 40 countries. NetBiter products are used to manage power generation applications and have been used with a number of generator sets/control panels.

The markets for NetBiter products include:

  • Industrial automation
  • Power generation
  • Energy management
  • Building automation
  • Asset management.

NetBiter webSCADA is an industrial gateway that gives equipment remote connectivity via Ethernet, Internet, local area networks (LANs), Telephone modems, Global System for Mobile Communications (GSM), and General Packet Radio Service (GPRS) networks.

The EasyConnect product is a remote device management product. It supports automation integration with the online server through web-based management of remote sites.

The Modbus Remote Terminal Unit (RTU)-Transmission Control Protocol (TCP) Gateway (MB100) connects serial Modbus products to SCADA software or Ethernet-based programmable logic controllers (PLCs) over Ethernet LANs. The gateway acts as a transparent connection between serial Modbus products and the standard Ethernet protocol Modbus TCP.

NetBiter Serial Ethernet Server (SS100) connects serial products over Ethernet or the Internet to a remote application. The Serial Ethernet Server encapsulates serial data (RS232 + RS485) into packets and transports it over Ethernet. The data can be transmitted in both directions, making it possible to access, manage, and configure remote equipment over LANs or the  Internet.

VULNERABILITY CHARACTERIZATION

Vulnerability Overview

A user who has been authenticated at the superadmin level (highest authentication level) has permission to read system files by calling read.cgi with options to read a system file. Local configuration files may be accessed by exploiting a directory traversal vulnerability. This may lead an attacker to research other potential attack vectors. An attacker may also execute arbitrary commands by uploading malicious code.

Vulnerability Details

Exploitability

Exploitation of these vulnerabilities requires superadmin privileges. While malicious code may be uploaded via the logo upload page, it would be easier to enable the ftp server to transfer malicious files.

It is important to note that all of these exploitable functions duplicate legitimate operations that are allowed by users with superadmin privileges.

Because superadmin privileges are required, caution should be exercised to avoid the use of default usernames and passwords. The exploitation of default user names and passwords to obtain superadmin access is a simple task requiring little skill.

Existence of Exploit

Access to a user account with superadmin privileges is all that is required for exploitation.

Difficulty

All vulnerabilities identified in the researcher’s report require authentication with superadmin privileges. If this is accomplished because an installation has not changed the default username and password, then exploitation may be a simple task requiring a low level of skill.

MITIGATION

A software update to address the directory traversal issue is being evaluated by Intellicom, but is not currently available.

Recommendations

The default user in NetBiter products has superadmin privileges. Therefore, ICS-CERT strongly recommends that customers change the default password immediately when commissioning the product. In addition, the ICS-CERT advises customers to provide only the necessary privileges to non-administrator users of the product (least privileges mode of operation). Other recommendations include:

--------- Begin Update A Part 2 of 2 --------

  • IntelliCom recommendsa “ISFR-4404-0010.npb” available from that users of the WS100/WS200 products apply the following patch “ISFR-4404-0010.npb, available from http://support.intellicom.se.”

--------- End Update A Part 2 of 2 --------

  • Place all control systems assets behind firewalls and isolated from the business network and the Internet.
  • Deploy secure remote access methods such as Virtual Private Networks (VPNs) for remote access.
  • Remove, disable, or rename any default system accounts (where possible).
  • Implement account lockout policies to reduce the risk from brute forcing attempts.
  • Implement policies requiring the use of strong passwords.b
  • Monitor the creation of administrator level accounts by third-party vendors.

Organizations should follow their established internal procedures if any suspected malicious activity is observed and report their findings to ICS-CERT for tracking and correlation against other incidents. ICS-CERT reminds organizations that proper impact analysis and risk assessment should be performed prior to taking defensive measures.

The Control System Security Program provides numerous recommended practices  for control systems on the US-CERT web site. Several relevant recommended practices are available for reading or downloading, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.


Contact Information

For any questions related to this report, please contact the NCCIC at:

Email: NCCICCUSTOMERSERVICE@hq.dhs.gov
Toll Free: 1-888-282-0870

For industrial control systems cybersecurity information:  http://ics-cert.us-cert.gov 
or incident reporting:  https://ics-cert.us-cert.gov/Report-Incident?

The NCCIC continuously strives to improve its products and services. You can help by choosing one of the links below to provide feedback about this product.

Was this document helpful?  Yes  |  Somewhat  |  No

Back to Top