Vulnerability in Schneider Electric Software Packages Could Allow Remote Code Execution
MS-ISAC ADVISORY NUMBER:2015-008
A vulnerability has been discovered in Schneider Electric Software Packages Unity Pro, SoMachine, SoMove, and SoMove Lite, that could allow a remote attacker to take complete control of a vulnerable system. Unity Pro is a development software to test, debug, and manage applications. SoMachine is a single software environment for developing, configuring, and commissioning automation machinery. SoMove/SoMove Lite is setup software for motor control devices.
Successful exploitation could allow an attacker to gain the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
At this time, there is no known proof-of-concept code available.
- Unity Pro, all versions
- SoMachine, all versions
- SoMove, all versions
- SoMove Lite, all versions
- Modbus Communication Library, Version 2.2.6 and prior
- CANopen Communication Library, Version 1.0.2 and prior
- EtherNet/IP Communication Library, Version 1.0.0 and prior
- EM X80 Gateway DTM (MB TCP/SL)
- Advantys DTMs (OTB, STB)
- KINOS DTM
- SOLO DTM
- Xantrex DTMs
- Large and medium government entities: HIGH
- Small government entities: HIGH
- Large and medium business entities: HIGH
- Small business entities: MEDIUM
A DLL in a DTM development kit which is installed during DTM set up could be vulnerable to a buffer overflow that may allow an attacker to cause a buffer overflow and remotely execute code.
Successful exploitation of this vulnerability could allow the attacker to bypass certain security restrictions, gain unauthorized access, run malicious HTML and script codes, or steal cookie-based authentication credentials. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Schneider Electric has released a patch that resolves the vulnerability by removing the vulnerable DLL.
We recommend the following actions be taken:
Update vulnerable systems running Unity Pro, SoMachine, SoMove, and SoMove Lite immediately after appropriate testing.
Confirm that the operating system and all other applications on the system running this software are updated with the most recent patches.
Deploy NIDS to detect and block attacks and anomalous activity such as crafted requests containing suspicious URI sequences.
Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.