U.S. Flag Official website of the Department of Homeland Security
U.S. Department of Homeland Security Seal. ICS-CERT. Industrial Control Systems Cyber Emergency Response Team.
TLP:WHITE

Alert (ICS-ALERT-10-305-01)

RealFlex RealWin Buffer Overflow Vulnerabilities

Original release date: November 01, 2010 | Last revised: August 27, 2013

Legal Notice

All information products included in http://ics-cert.us-cert.gov are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see http://www.us-cert.gov/tlp/.



Summary

An independent security researcher has published information regarding vulnerabilities in RealFlex’s Realwin SCADA software product to a vulnerability disclosure web site. ICS-CERT has reached out to both RealFlex and the security researcher and will continue to work with the vendor to validate the researcher’s claim.

According to the researcher’s report, the service listening on TCP port 912 is vulnerable to multiple stack-based buffer overflows from specially crafted packets.

RealWin is a SCADA server product, which includes an HMI and runs on Windows 2000 and XP. RealFlex products are used in more than 45 countries with primary sectors being power, oil and gas, water and wastewater, marine, transport, chemical, manufacturing, and telecommunications.

ICS-CERT is coordinating this vulnerability with the CERT Coordination Center.

Followup

ICS-CERT released vulnerability details and mitigation recommendations in the follow-up advisory, ICSA-10-313-01 RealWin Buffer Overflow, on November 01, 2010.

Mitigation

ICS-CERT recommends:

  • Placing all control systems assets behind firewalls, separated from the business network.
  • Implementing network or host-based firewall rules to limit network access to TCP port 912.
  • Deploying secure remote access methods such as Virtual Private Networks (VPNs) for remote access.

ICS-CERT will provide additional information as it becomes available.


Contact Information

For any questions related to this report, please contact the NCCIC at:

Email: NCCICCUSTOMERSERVICE@hq.dhs.gov
Toll Free: 1-888-282-0870

For industrial control systems cybersecurity information:  http://ics-cert.us-cert.gov 
or incident reporting:  https://ics-cert.us-cert.gov/Report-Incident?

The NCCIC continuously strives to improve its products and services. You can help by choosing one of the links below to provide feedback about this product.

Was this document helpful?  Yes  |  Somewhat  |  No

Back to Top