AzeoTech DAQFactory Stack Overflow


时间: 2011-09-21

风险等级: 未知

ICSA: ICS Advisory (ICSA-11-264-01)

厂商: 未知



This advisory is a follow-up to the alert titled “ICS-ALERT-11-256-02—AzeoTech DAQFactory Stack Overflow” that was published September 13, 2011, on the ICS-CERT web page.

ICS-CERT is aware of a public report of one stack overflow vulnerability with proof-of-concept (POC) exploit code affecting AzeoTech DAQFactory, a SCADA/HMI Product. According to the report, the vulnerability is exploitable via a service running on Port 20034/UDP. The report was released without coordinating with either the vendor or ICS-CERT. ICS-CERT has coordinated with AzeoTech, which has produced an upgrade that resolves the vulnerability. ICS-CERT has not validated the upgrade.

Attribution for the vulnerability discovery is not provided in this advisory because no prior coordination occurred with the vendor, ICS-CERT, or other coordinating body. ICS-CERT encourages researchers to coordinate vulnerability details before public release. The public release of vulnerability details prior to the development of proper mitigations may put industrial control systems (ICSs) and the public at avoidable risk.

Affected Products

According to AzeoTech, only DAQFactory Version 5.85 is affected by this vulnerability.


This stack overflow vulnerability could allow an attacker to cause a denial of service or remotely execute code on the targeted system.

Impact to individual organizations depends on many factors that are unique to each organization. ICS-CERT recommends that organizations evaluate the impact of this vulnerability based on their environment, architecture, and product implementation.


DAQFactory is a supervisory control and data acquisition (SCADA) and human-machine interface (HMI) software used in multiple industries including water, power, and manufacturing. DAQFactory installations are primarily located in the United States and Europe.

Vulnerability Characterization

Vulnerability Overview

DAQFactory listens on Port 20034/UDP by default. An attacker can send specially crafted traffic to this port to cause a stack overflow, which may allow remote code execution.

MITRE has assigned number CVE-2011-3492 to this vulnerability in the Common Vulnerabilities and Exposures (CVE) database.

Vulnerability Details


This vulnerability is remotely exploitable.

Existence of Exploit

Public exploits are known to target this vulnerability.


An attacker with a low skill level can create the denial of service; however, only a more skilled attacker could exploit this vulnerability to execute arbitrary code.


According to AzeoTech, the vulnerable feature has been completely removed in the next version (Version 5.86). The feature was undocumented, and AzeoTech does not believe it was being used by any of their customers. Therefore, its removal should not adversely affect any DAQFactory users.

AzeoTech provides the following instructions to upgrade to Version 5.86: Existing customers can download and install the DAQFactory trial from the website ( over their existing installation at no charge. The user’s license is maintained. Because this is the standard update path for DAQFactory, most customers will be familiar with the process.

ICS-CERT encourages asset owners to take additional defensive measures to protect against this and other cybersecurity risks.

  • Minimize network exposure for all control system devices. Critical devices should not directly face the Internet.
  • Locate control system networks and remote devices behind firewalls, and isolate them from the business network.
  • When remote access is required, use secure methods such as Virtual Private Networks (VPNs), recognizing that VPN is only as secure as the connected devices.

The Control Systems Security Program (CSSP) also provides a section for control system security recommended practices on the CSSP web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to taking defensive measures.

Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents.