DoS vulnerabilities found in EtherNet/IP stack for industrial systems
Experts have warned of multiple vulnerabilities in the OpENer EtherNet/IP stack. Exploitation of problems could cause a "denial of service" condition of industrial systems, data leaks, and remote code execution.
The problems were discovered by specialists from Claroty and affect all commits and versions of OpENer released before February 10, 2021. In total, five vulnerabilities were discovered.
“An attacker would only need to send crafted ENIP/CIP packets to the device in order to exploit these vulnerabilities,” the experts explained.
The first concerns an out-of-bounds write vulnerability (CVE-2020-13556) in the Ethernet/IP server that could be exploited by sending a series of specially crafted network requests to trigger remote code execution. The problem received a score of 9.8 out of a maximum 10 on the CVSS scale.
Another vulnerability (CVE-2021-27478) is related to the handling of Common Industrial Protocol (CIP) requests and allows DoS attacks. Another issue (CVE-2021-27482) is an out-of-bounds read vulnerability. With the help of specially crafted packets, can be read arbitrary data from memory. The last two vulnerabilities (CVE-2021-27500 and CVE-2021-27498) could also be exploited by sending specially crafted packets to result in a DoS condition.
Users of the OpENer stack are recommended to update to the latest version and take protective measures to minimize network vulnerabilities.
Source: securitylab.ru
19 April 2021