WellinTech KingView 6.53 ActiveX Vulnerability
All information products included in http://ics-cert.us-cert.gov are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see http://www.us-cert.gov/tlp/.
ICS-CERT has become aware of public reports of a vulnerability in WellinTech KingView v6.53. This vulnerability reportedly affects the KVWebSvr.dll. Exploit code has been published.
According to the WellinTech website, KingView is widely used in power, water, building automation, mining, and other sectors, with most installations in China. The Chinese aerospace industry also uses KingView.
ICS-CERT is currently working with WellinTech to validate this vulnerability report. ICS-CERT is providing this information as an immediate notification of new activity. ICS-CERT will release further information as it becomes available.
Please report any issues affecting control systems in critical infrastructure environments to ICS-CERT.
ICS-CERT published the follow-up advisory titled ICSA-11-074-01 - WellinTech KingView 6.53 KVWebSvr ActiveX on March 15, 2011.
For any questions related to this report, please contact the NCCIC at:
Toll Free: 1-888-282-0870
The NCCIC continuously strives to improve its products and services. You can help by choosing one of the links below to provide feedback about this product.