DNP3 Implementation Vulnerability (Update B)
All information products included in http://ics-cert.us-cert.gov are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see http://www.us-cert.gov/tlp/.
This updated advisory is a follow-up to the updated advisory titled ICSA-13-291-01A DNP3 Implementation Vulnerability that was published November 21, 2013, on the NCCIC/ICS-CERT web site.
Adam Crain of Automatak and Chris Sistrunk, Sr. Consultant for Mandiant, reported an improper input validation vulnerability to ICS-CERT that was evident in numerous slave and/or master station software products. The researchers emphasize that the vulnerability is not with the DNP3 stack but with the implementation.
The research showed that some implementations were third-party components in other software packages. ICS-CERT wants to bring greater awareness to developers and consumers of the third‑party components for mitigation purposes.
This vulnerability can be exploited remotely (over an IP-based implementation) as well as from the local system (through a serial-based implementation).
Below is a nonexhaustive list of advisories that ICS-CERT has produced in conjunction with the vendors who are producing patches or updates to mitigate the reported vulnerability.
--------- Begin Update B Part 1 of 1 --------
|ICSA-13-346-01||Cooper Power Systems|
|ICSA-13-346-02||Cooper Power Systems/Cybectec|
|ICSA-13-219-01||Schweitzer Engineering Laboratories|
--------- End Update B Part 1 of 1 ----------
The outstation/slave can be sent into an infinite loop or Denial of Service condition by sending a specially crafted TCP packet from the master station on an IP-based network. If the device is connected via a serial connection, the same attack can be accomplished with physical access to the master station. The device must be shut down and restarted to reset the loop state.
The master station can be sent into an infinite loop by sending a specially crafted TCP packet from the outstation/slave on an IP-based network. If the device is connected via a serial connection, the same attack can be accomplished with physical access to the outstation. The device must be shut down and restarted to reset the loop state.
Impact to individual organizations depends on many factors that are unique to each organization. ICS‑CERT recommends that organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation.
Adam Crain of Automatak, working with Chris Sistrunk, Sr. Consultant for Mandiant, disclosed this vulnerability as part of a larger research project. Their outreach stems from their work with the DNP3 Standards Working group.
As this vulnerability affects Internet protocol-connected and serial-connected devices, two CVSS scores have been calculated.
IMPROPER INPUT VALIDATION-IP-BASEDa
An attacker could cause the software to go into an infinite loop with a specifically crafted TCP packet, causing the process to crash. The system must be restarted manually to clear the condition.
The following scoring is for IP-connected devices.
A CVSS v2 base score of 7.1 has been assigned; the CVSS vector string is (AV:N/AC:M/Au:N/C:N/I:N/A:C).b
IMPROPER INPUT VALIDATION-Serial-BASEDc
An attacker could cause the software to go into an infinite loop, causing the process to crash. The system must be restarted manually to clear the condition.
The following scoring is for serial-connected devices.
A CVSS v2 base score of 4.7 has been assigned; the CVSS vector string is (AV:L/AC:M/Au:N/C:N/I:N/A:C).d
The IP-based vulnerability could be exploited remotely.
The serial-based vulnerability is not exploitable remotely. Local access to the serial-based outstation is required.
EXISTENCE OF EXPLOIT
No known public exploits specifically target this vulnerability.
An attacker with a moderate skill could craft an IP packet that would be able to exploit this vulnerability for an IP-based device.
An attacker with a high skill could exploit the serial-based vulnerability because physical access to the device or some amount of social engineering is required.
Because this vulnerability is identified with fuzzing tools, the researchers suggest developers use extensive negative testing during quality control of products. The researchers also suggest blocking DNP3 traffic from traversing onto business or corporate networks through the use of an IPS or firewall with DNP3-specific rule sets.
ICS-CERT encourages asset owners to take additional defensive measures to protect against this and other cybersecurity risks.
- Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet.
- Locate control system networks and remote devices behind firewalls, and isolate them from the business network.
- When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPN is only as secure as the connected devices.
ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT web page at: http://ics-cert.us-cert.gov/content/recommended-practices. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
Additional mitigation guidance and recommended practices are publicly available in the ICS‑CERT Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Mitigation Strategies, that is available for download from the ICS-CERT web site (http://ics-cert.us-cert.gov/).
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents.
- a. CWE-20: Improper Input Validation, http://cwe.mitre.org/data/definitions/20.html, web site last accessed October 18, 2013.
- b. CVSS Calculator, http://nvd.nist.gov/cvss.cfm?version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:C, web site last accessed October 18, 2013.
- c. CWE-20: Improper Input Validation, http://cwe.mitre.org/data/definitions/20.html, web site last accessed October 18, 2013.
- d. CVSS Calculator, http://nvd.nist.gov/cvss.cfm?version=2&vector=AV:L/AC:M/Au:N/C:N/I:N/A:C, web site last accessed October 18, 2013.
For any questions related to this report, please contact the NCCIC at:
Toll Free: 1-888-282-0870
The NCCIC continuously strives to improve its products and services. You can help by choosing one of the links below to provide feedback about this product.