SCADA: ABB MicroSCADA Wserver Component Arbitrary Command Execution

This signature detects attempts to exploit a known vulnerability against the Wserver component of ABB MicroSCADA. It is because user controlled data is passed as command line arguments to the CreateProcessA function enabling arbitrary command execution without access control. A remote unauthenticated attacker can exploit this vulnerability by sending requests with the EXECUTE opcode to the vulnerable service. Successful exploitation could lead to arbitrary command execution in the context of the Wserver process.

Short Name
SCADA:ABB-WSERVER-CMD-EXEC
Severity
Major
Recommended
False
Recommended Action
Drop
Category
SCADA
Keywords
ABB Arbitrary Command Component Execution MicroSCADA Wserver bid:63901
Release Date
12/16/2013
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3324
Port
TCP/12221
False Positive
Unknown

Found a potential security threat?