1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. Attack: ABB MicroSCADA "wserver.exe" Remote Code Execution Vulnerability

Attack: ABB MicroSCADA "wserver.exe" Remote Code Execution Vulnerability

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects attempt of leveraging a remote code execution vulnerability in ABB MicroSCADA which could result in executing arbitrary code in the context of the affected process.

Additional Information

ABB MicroSCADA is a system for real-time monitoring and control of primary and secondary equipment.

ABB MicroSCADA is prone to a remote code-execution vulnerability because it fails to properly sanitize user-supplied input before using it in a 'CreateProcessA()' call. Specifically, this issue that exists in the 'wserver.exe' program. This issue can be exploited to execute remote code by supplying an UNC path to an attacker-controlled binary.

Attackers can exploit this issue to execute arbitrary code in the context of the affected process.

Affected

  • MicroSCADA, COM 500 4.1, 4.2
  • MicroSCADA, SYS 500 8.4.5
  • MicroSCADA Pro, SYS 600 9.0, 9.1, 9.1.5, 9.2, 9.3, 9.3 FP1, 9.3 FP2

Additional References

  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube