Client-side JavaScript controls may be bypassed by directly running a JS function to reboot the PLC (e.g., from the browser console) or by loading the corresponding, browser accessible PHP script
Client-side JavaScript controls may be bypassed by directly running a JS function to reboot the PLC (e.g., from the browser console) or by loading the corresponding, browser accessible PHP script
Description: CWE-841 IMPROPER ENFORCEMENT OF BEHAVIORAL WORKFLOW
Metrics
Version
Base score
Base severity
Vector
3.1
7.5
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Version:3.1
Base score:7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC ID
Description
Solutions
Secheron recommends updating its software to the latest version:
SEPCOS Single Package firmware (1.23.xx feature level): Update to 1.23.22 or higher version
SEPCOS Single Package firmware (1.24.xx feature level): Update to 1.24.8 or higher version
SEPCOS Single Package firmware (1.25.xx feature level): Update to 1.25.3 or higher version
Configurations
Workarounds
Additional workarounds are suggested to help reduce the risk:
Configure the network such that PLC communications are strictly limited to only the devices required to perform its functions.
Limit remote access and close Ports 80 and 443 at the switch level.
Only use approved devices to connect to the PLCs. Do not connect personal peripherals (USB sticks, hotspots) to approved devices.
Check device logs during periodic maintenance for unauthorized changes or access.
Exploits
Credits
Anthony Candarini of AECOM, Clark Bradley of Elliott Davis, Mike Curnow of AECOM, and Balakrishna Subramoney of SAM Analytic Solutions reported these vulnerabilities to CISA.
Client-side JavaScript controls may be bypassed by directly running a JS function to reboot the PLC (e.g., from the browser console) or by loading the corresponding, browser accessible PHP script