U.S. Flag Official website of the Department of Homeland Security
U.S. Department of Homeland Security Seal. ICS-CERT. Industrial Control Systems Cyber Emergency Response Team.
TLP:WHITE

Advisory (ICSA-13-011-01)

3S CoDeSys Vulnerabilities

Original release date: January 10, 2013 | Last revised: March 05, 2014

Legal Notice

All information products included in http://ics-cert.us-cert.gov are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see http://www.us-cert.gov/tlp/.



Overview

This advisory is a follow-up to the ICS-CERT Alert titled “ICS-ALERT-12-097-02A 3S-Software CoDeSys Improper Access Control (Update A)" that was published October 26, 2012. This advisory provides mitigation details for multiple vulnerabilities that affect the 3S-Smart Software Solutions CoDeSys Runtime Toolkit.

Independent researcher Reid Wightman of IOActive, formerly of Digital Bond, identified1 an improper access control and a directory traversal vulnerability in the 3S CoDeSys Runtime application without coordination with ICS-CERT, the vendor, or any other coordinating entity known to ICS-CERT. Exploitation of these vulnerabilities would allow unauthorized access to the system and unauthorized access to the file system. The CoDeSys Runtime Toolkit is used in a number of vendor’s products worldwide. 3S has developed a patch that implements a password for authentication to the system. Reid Wightman has validated that the patch, issued by 3S, mitigates theses vulnerabilities.

These vulnerabilities can be exploited remotely. Exploits that target these vulnerabilities are known to be publicly available. This researcher has released proof-of-concept (PoC) code for these vulnerabilities.

Affected Products

The following 3S CoDeSys Runtime versions are affected:

  • CoDeSys Version 2.3.X
  • CoDeSys Version 2.4.X

Note: CoDeSys Version 3.X is not affected by these vulnerabilities.

Impact

The improper access control vulnerability allows attackers to gain unauthorized administrative access to the device. Once access is obtained, the attacker has the ability to perform privileged operations without a password. Attackers can also exploit the directory traversal vulnerability to read and write to the file system.

The 3S CoDeSys Runtime Toolkit is an embedded system that is used in a wide variety of different products manufactured by various vendors. 3S published a list of devices on their Web page that contained their products, but this has since been removed. It is believed that the CoDeSys Runtime Toolkit is used in over 260 individual products.

Devices and programmable logic controllers (PLCs) that use the embedded CoDeSys Runtime Toolkit are used in various industries to include critical manufacturing, energy, transportation, and others. Devices containing CoDeSys are impacted.

Impact to individual organizations depends on many factors that are unique to each organization. ICS-CERT recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation.

Background

3S-Smart Software Solutions is a German-based company that maintains offices in Germany and China. 3S develops software that is used in various PLC and industrial controllers. 3S also develops products specifically for visualization applications (HMIs), engineering desktop programming platforms, safety modules, and fieldbus controllers.

The affected product, CoDeSys Runtime Toolkit, is embedded third-party software used in various manufacturers’ SCADA systems. According to 3S, CoDeSys is deployed across several sectors including critical manufacturing, building automation, energy, transportation, and others. 3S estimates that these products are used worldwide.

Vulnerability Characterization

Vulnerability Overview

Improper Access Controla

The CoDeSys Runtime Toolkit does not require users to authenticate when connecting to the device. An attacker could obtain administrative privileges on the device by default. This could allow the attacker to compromise the availability, integrity, and confidentiality of the device.

CVE-2012-6068 has been assigned to this vulnerability. A CVSS v2 base score of 10.0 has been assigned; the CVSS vector string is (AV:N/AC:L/Au:N/C:C/I:C/A:C).

Directory Traversalb

The CoDeSys Runtime Toolkit’s file transfer functionality does not perform input validation, which allows an attacker to access files and directories outside the intended scope. This allows an attacker to upload and download any file on the device. This could allow the attacker to affect the availability, integrity, and confidentiality of the device.

CVE-2012-6069 has been assigned to this vulnerability. A CVSS v2 base score of 10.0 has been assigned; the CVSS vector string is (AV:N/AC:L/Au:N/C:C/I:C/A:C).

Vulnerability Details

Exploitability

These vulnerabilities could be exploited remotely.

Existence of Exploit

Exploits that target these vulnerabilities are publicly available.

Difficulty

An attacker with a low skill would be able to exploit these vulnerabilities.

Mitigation

3S released a press release concerning these vulnerabilities to their News & Events page, which details the patch released to mitigate the vulnerabilities. The patch released by 3S implements a password for authentication to the device. The patch can be downloaded from the CoDeSys Download Center. 3S also recommends the usage of standard security methods like firewalls or Virtual Private Network (VPN) access to prevent unauthorized access to the controller.

CoDeSys version 3.X is not affected by these vulnerabilities.

ICS-CERT encourages asset owners to upgrade to version 3 and take additional defensive measures to protect against this and other cybersecurity risks.

  • Minimize network exposure for all control system devices. Critical devices should not directly face the Internet.
  • Locate control system networks and remote devices behind firewalls, and isolate them from the business network.
  • When remote access is required, use secure methods, such as VPNs, recognizing that VPN is only as secure as the connected devices.

ICS-CERT also provides a section for control systems security recommended practices on the US-CERT Web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to taking defensive measures.

Additional mitigation guidance and recommended practices are publicly available in the ICS-CERT Technical Information Paper, ICS-TIP-12-146-01A—Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents.


Contact Information

For any questions related to this report, please contact the NCCIC at:

Email: NCCICCUSTOMERSERVICE@hq.dhs.gov
Toll Free: 1-888-282-0870

For industrial control systems cybersecurity information:  http://ics-cert.us-cert.gov 
or incident reporting:  https://ics-cert.us-cert.gov/Report-Incident?

The NCCIC continuously strives to improve its products and services. You can help by choosing one of the links below to provide feedback about this product.

Was this document helpful?  Yes  |  Somewhat  |  No

Back to Top