Microsoft has identified two security flaws in Rockwell Automation PanelView Plus that could arm remote, unauthenticated attackers to execute arbitrary code and trigger a Denial of Service (DoS) condition.
“The (remote code execution) vulnerability in PanelView Plus includes two custom classes that can be exploited to download and install a malicious DLL on a device,” security researcher Yuval Gordon said.
“The DoS vulnerability exploits the same custom class to send a crafted buffer that the device cannot process properly, resulting in a DoS.”
The list of disadvantages is as follows –
- CVE-2023-2071 (CVSS Score: 9.8) – Typo validation vulnerability allows unauthenticated attackers to obtain remote code execution via crafted malicious packages.
- CVE-2023-29464 (CVSS Score: 8.2) – Improper input validation vulnerability that allows an unauthenticated threat actor to read data from memory via crafted malicious packets and cause a DoS by sending a packet larger than the buffer size
Successful exploitation of the dual flaws allows an adversary to execute code remotely or lead to information disclosure or a DoS condition.
While CVE-2023-2071 affects FactoryTalk View Machine Edition (versions 13.0, 12.0 and earlier), CVE-2023-29464 affects FactoryTalk Linx (versions 6.30, 6.20 and earlier).
It should be noted that the flaw advisories were issued by Rockwell Automation on September 12, 2023and October 12, 2023, respectively. The US Cybersecurity and Infrastructure Security Agency (CISA) has published its own alerts September 21 and October 17.
Information disclosure occurs when it is assumed that these are unknown threat actors exploiting a recently disclosed critical security flaw in an HTTP file server (CVE-2024-23692CVSS score: 9.8) to provide cryptocurrency mining and trojans such as Xeno RATGh0st RAT, PlugX, and GoThief, the latter of which uses Amazon Web Services (AWS) to steal information from an infected host.
A vulnerability described as a case template injectionallows a remote, unauthenticated attacker to execute arbitrary commands on a compromised system by sending a specially crafted HTTP request.