PT-2013-91: Hard-Coded Access Credentials in Emerson DeltaV

Vulnerable software

Emerson DeltaV
Version: 10.3.1, 11.3, 11.3.1, and 12.3

Link:
http://www2.emersonprocess.com/en-US/brands/deltav/Pages/index.aspx

Severity level

Severity level: High
Impact: Arbitrary Code Execution
Access Vector: Remote

CVSS v2:
Base Score: 7.5
Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE: CVE-2014-2350

Software description

Emerson DeltaV - As the first fully digital automation system, the DeltaV Digital Automation System helps you improve your operations by harnessing today’s predictive technologies in an easy, intuitive, and interoperable way to connect your people, process, and production.

The system is packed full of key features like I/O marshalling on demand, scalability to match any project size, intelligent control, seamless integration, and best of all, customization to your process control application needs.

Vulnerability description

The specialists of the Positive Research center have detected a Hard-Coded Access Credentials vulnerability in Emerson DeltaV.

An attacker can connect to the application using Telnet and run commands or change settings.

How to fix

Update your sofware up to the latest version

Advisory status

03.10.2013 - Vendor gets vulnerability details
22.05.2014 - Vendor releases fixed version and details
28.05.2014 - Public disclosure

Credits

The vulnerability was detected by Kirill Nesterov, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2013-91
http://ics-cert.us-cert.gov/advisories/ICSA-14-133-02

Reports on the vulnerabilities previously discovered by Positive Research:

http://www.ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/

Threatscape
4G and 5G are not ready for smart cities