U.S. Flag Official website of the Department of Homeland Security
U.S. Department of Homeland Security Seal. ICS-CERT. Industrial Control Systems Cyber Emergency Response Team.
TLP:WHITE

Alert (ICS-ALERT-10-293-01)

Intellicom NetBiter WebSCADA Vulnerabilities

Original release date: October 20, 2010 | Last revised: January 21, 2014

Legal Notice

All information products included in http://ics-cert.us-cert.gov are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see http://www.us-cert.gov/tlp/.



SUMMARY

Russian firm ITDefense has reported multiple vulnerabilities in the Intellicom NetBiter® WebSCADA product.

According to IntelliCom, their NetBiter® products have been deployed in over 40 countries. The markets for NetBiter® solutions include industrial automation, power generation, energy management, building automation, and asset management.

The three issues identified by ITDefense all appear to be related to a directory traversal vulnerability that can be exploited through the WebSCADA embedded web server. If a user has been authenticated with “superadmin” privileges, (highest authentication level) they have permission to read system files by calling read.cgi with options to read a system file.

ICS-CERT is working with Intellicom to address these vulnerabilities. As an interim mitigation, Intellicom recommends customers change the default password when installing the product. In addition, they strongly advise customers to provide only the necessary privileges to non-administrator users of the product.

ICS-CERT will provide additional information as it becomes available.

Please report any issues affecting control systems in critical infrastructure environments to ICS-CERT.

Other resources:
http://seclists.org/bugtraq/2010/Oct/1
http://secunia.com/advisories/41671/

FOLLOW-UP

ICS-CERT released the follow-up advisory, ICSA-10-316-01 - Intellicom NetBiter Vulnerabilities, on the ICS-CERT Web site on December 27, 2010.


Contact Information

For any questions related to this report, please contact the NCCIC at:

Email: NCCICCUSTOMERSERVICE@hq.dhs.gov
Toll Free: 1-888-282-0870

For industrial control systems cybersecurity information:  http://ics-cert.us-cert.gov 
or incident reporting:  https://ics-cert.us-cert.gov/Report-Incident?

The NCCIC continuously strives to improve its products and services. You can help by choosing one of the links below to provide feedback about this product.

Was this document helpful?  Yes  |  Somewhat  |  No

Back to Top