PT-2014-47: Arbitrary memory write in Honeywell EPKS
Vulnerable software
Honeywell EPKS
Version: R311
Link:
http://honeywell.com/
Severity level
Severity level: High
Impact: Remote code execution, denial of service
Access Vector: Remote
CVSS v2:
Base Score: 9.3
Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE: not assigned
Software description
Honeywell Experion PKS is a cost-effective open control and safety system that expands the role of distributed control. Experion provides a safe, robust, scalable, plant-wide system with unprecedented connectivity through all levels of the plant.
Vulnerability description
The specialists of the Positive Research center have detected an Arbitrary memory write vulnerability in Honeywell EPKS.
Arbitratry memory write was discovered in function read_exact_silent_master() from dual_onsrv.exe module which could lead to possible remote code execution or denial of service.
How to fix
Update your sofware up to the latest version
Advisory status
06.03.2014 - Vendor gets vulnerability details
02.06.2014 - Vendor releases fixed version and details
18.11.2014 - Public disclosure
Credits
The vulnerability was detected by Alexander Tlyapov, Positive Research Center (Positive Technologies Company)
References
http://en.securitylab.ru/lab/PT-2014-47
Reports on the vulnerabilities previously discovered by Positive Research:
http://www.ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/