U.S. Flag Official website of the Department of Homeland Security
U.S. Department of Homeland Security Seal. ICS-CERT. Industrial Control Systems Cyber Emergency Response Team.
TLP:WHITE

Advisory (ICSA-11-279-03A)

Unitronics UNIOPC Server Input Handling Vulnerability (Update A)

Original release date: October 12, 2011 | Last revised: May 08, 2013

Legal Notice

All information products included in http://ics-cert.us-cert.gov are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see http://www.us-cert.gov/tlp/.



Overview

Independent security researchers Billy Rios and Terry McCorkle have identified a vulnerability in Unitronics’ UniOPC Server product.

--------- Begin Update A Part 1 of 3 --------

This vulnerability is a result of improper handling of input by a third-party component, https50.ocx, which is part of “IP*Works! SSL.”1

--------- Begin End A Part 1 of 3 --------

IP*Works! is used in the UniOPC product. Successful exploitation of this vulnerability results in a crash and could result in the execution of arbitrary code.

Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) has coordinated with Unitronics and the security researchers. Unitronics has released a new version that does not contain the vulnerable component. The researchers have confirmed that the vulnerable component is not present in the new version. However, customers installing the new version on a system that had previously contained an affected version of UniOPC are still vulnerable as the update does not remove the vulnerable component.

Affected Products

This vulnerability affects versions of Unitronics UniOPC prior to Version 2.0.0.

Impact

Exploitation of this vulnerability could result in the execution of arbitrary code on a system running an affected version of the Unitronics UniOPC product.

Impact to individual organizations depends on many factors that are unique to each organization. ICS-CERT recommends that organizations evaluate the impact of this vulnerability based on their environment, architecture, and product implementation.

Background

--------- Begin Update A Part 2 of 3 --------

Unitronics is based in Israel. UniOPC Server provides the ability to read and write data between Unitronics programmable logic controllers (PLCs) and other OPC applications.

--------- End Update A Part 2 of 3 --------

UniOPC Server is a standalone product that runs independently of other Unitronics software. According to Unitronics, UniOPC is used worldwide in multiple sectors.

Vulnerability Characterization

Vulnerability Overview

--------- Begin Update A Part 3 of 3 --------

This vulnerability resides in the https50.ocx component of “IP*Works! SSL” that is used as part of the Unitronics UniOPC product.

--------- End Update A Part 3 of 3 --------

An attacker could build a specially crafted website that accesses the vulnerable function to cause a crash and potentially execute arbitrary code.

Vulnerability Details

Exploitability

This vulnerability is remotely exploitable.

Existence of Exploit

No known exploits specifically target this vulnerability.

Difficulty

An attacker with a low to medium skill level may exploit this vulnerability.

Mitigation

Unitronics has released Version 2.0.0 of UniOPC Server. Unitronics recommends that users of all versions of the UniOPC Server product download and install Version 2.0.0 or newer from the following location: http://www.unitronics.com/Content.aspx?page=Downloads.

Unitronics has not provided mitigation steps for existing customers who are currently using affected versions of UniOPC. The vulnerable component will remain on the system even after the new version has been installed.

To manually remove the vulnerable component, the researcher suggests the following steps:

  1. Ensure that no other applications are using https50.ocx prior to its removal.
  2. From a command prompt type: regsvr32 /U c:\windows\system32\https50.ocx
  3. Delete the c:\windows\system32\https50.ocx file.

ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to taking defensive measures.

In addition to installing the latest version of UniOPC Server, ICS-CERT encourages asset owners to take additional defensive measures to protect their systems from this and other vulnerabilities.

  • Minimize network exposure for all control system devices. Critical devices should not directly face the Internet.
  • Locate control system networks and remote devices behind firewalls, and isolate them from the business network.
  • When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPN is only as secure as the connected devices.

The Control Systems Security Program (CSSP) also provides a section for control system security recommended practices on the CSSP web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

In addition, ICS-CERT recommends that users take the following measures to protect themselves from social engineering attacks:

  1. Do not click web links or open unsolicited attachments in e-mail messages.
  2. Refer to Recognizing and Avoiding Email Scams for more information on avoiding e-mail scams.
  3. Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.


Contact Information

For any questions related to this report, please contact the NCCIC at:

Email: NCCICCUSTOMERSERVICE@hq.dhs.gov
Toll Free: 1-888-282-0870

For industrial control systems cybersecurity information:  http://ics-cert.us-cert.gov 
or incident reporting:  https://ics-cert.us-cert.gov/Report-Incident?

The NCCIC continuously strives to improve its products and services. You can help by choosing one of the links below to provide feedback about this product.

Was this document helpful?  Yes  |  Somewhat  |  No

Back to Top