SCADA systems Distributed Control Systems (DCS) contain multiple vulnerabilities that could allow an attacker to gain elevated privileges or cause a denial of service (DoS) condition on a targeted system.
Multiple vulnerabilities have been identified in the Distributed Control Systems used by SCADA systems that are used for subsystem automation in multiple industries.
The first vulnerability is due to improper handling of unspecified, malformed messages by the Human Machine Interface (HMI) component of the affected software. An exploit could lead to a DoS condition on the targeted SCADA system, denying service to legitimate users.
A second vulnerability is due to improper processing of large volumes of packets because systems fail to properly process a continuous series of UDP data packets to closed UDP ports 1024 and 5500.
A third vulnerability exists when handling a continuous series of Internet Group Management Protocol (IGMP) packets by an affected system. An unauthenticated, remote attacker could exploit the vulnerability to accomplish a DoS condition.
A fourth vulnerability exists that could allow attackers to gain escalated privileges on a system via the setpriv telnet command. This vulnerability exists because of the insecure implementation of user authentication mechanisms by the affected device, allowing unauthenticated read and write access.
Administrators are advised to implement an intrusion prevention system (IPS) or intrusion detection system (IDS) to help detect and prevent attacks that attempt to exploit this vulnerability. Administrators may consider using IP-based access control lists (ACLs) to allow only trusted systems to access the affected systems.