U.S. Flag Official website of the Department of Homeland Security
U.S. Department of Homeland Security Seal. ICS-CERT. Industrial Control Systems Cyber Emergency Response Team.

Advisory (ICSA-11-018-01)

AGG SCADA Viewer OPC Buffer Overflow Vulnerability

Original release date: January 18, 2011 | Last revised: December 31, 2013

Legal Notice

All information products included in http://ics-cert.us-cert.gov are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see http://www.us-cert.gov/tlp/.



Overview

The ICS-CERT has received a report from independent security researcher Steven James that a stack-based buffer overflow exists in the AGG Software OPC SCADA Viewer software. The vulnerability could allow arbitrary code execution. ICS-CERT has coordinated with AGG Software, which has developed a patch to address this vulnerability. The researcher has also verified that the patch resolves the issue.

Affected Products

This vulnerability affects all OPC SCADA Viewer versions prior to Version 1.5.2 (Build 110).

Impact

A successful exploit of this vulnerability could lead to arbitrary code execution. The exact impact to individual organizations depends on many factors that are unique to each organization. ICS-CERT recommends that organizations evaluate the impact of this vulnerability based on their environment, architecture, and product implementation.

Background

AGG Software is a North American company that produces data acquisition, data logging, and monitoring software for hardware interfaces. OPC SCADA Viewer is a tool that displays data received through the OPC interface.

Vulnerability Characterization

Vulnerability Overview

OPC SCADA Viewer is vulnerable to a stack-based buffer overflow. An attacker can craft a special configuration file that can allow arbitrary code execution when parsed by OPC SCADA Viewer.

Exploitability

This vulnerability is exploitable from the local machine.

Existence of Exploit

No publicly available exploit is known to exist.

Difficulty

A moderate level of skill is needed to exploit this vulnerability.

Mitigation

ICS-CERT recommends that users of OPC SCADA Viewer take the following mitigation steps:

  • Update OPC SCADA Viewer to the latest version (1.5.2 (Build 110)) or install Update Version 1.5.2 build 110 to patch releases since Version 1.5.0. The latest version and update can be found on AGG’s OPC SCADA Viewer download page.
  • Do not open configuration files from an untrusted source.

Organizations should follow their established internal procedures if any suspected malicious activity is observed and report their findings to ICS-CERT for tracking and correlation against other incidents. ICS-CERT reminds organizations that proper impact analysis and risk assessment should be performed prior to taking defensive measures.

The Control System Security Program also provides a recommended practices section for control systems on the US-CERT website. Several recommended practices are available for reading or download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.


Contact Information

For any questions related to this report, please contact the NCCIC at:

Email: NCCICCUSTOMERSERVICE@hq.dhs.gov
Toll Free: 1-888-282-0870

For industrial control systems cybersecurity information:  http://ics-cert.us-cert.gov 
or incident reporting:  https://ics-cert.us-cert.gov/Report-Incident?

The NCCIC continuously strives to improve its products and services. You can help by choosing one of the links below to provide feedback about this product.

Was this document helpful?  Yes  |  Somewhat  |  No

Back to Top