Rockwell Automation RSLinx Classic EDS Vulnerability (Update A)
ICSA： ICS Advisory (ICSA-10-070-01A)
A buffer overflow vulnerability exists in the Rockwell Automation RSLinx Classic EDS Hardware Installation Tool (RSHWare.exe). This vulnerability is likely exploitable; however, significant user interaction would be required.
EDS Hardware Installation Tool Version 18.104.22.168 and earlier.
The CVSS impact subscore for this vulnerability, as calculated by ICS-CERT, is high (10) because successfully exploiting this vulnerability would allow an attacker to run arbitrary code on the target machine. However, the exploitability subscore is low (3.2) because of the difficulty of exploiting this vulnerability.
Impact to individual organizations depends on many factors that are unique to each organization. ICS-CERT recommends that organizations evaluate the impact of this vulnerability based on their environment, architecture, and product implementation.
Rockwell Automation provides industrial automation control and information products worldwide across a wide range of industries.
RSLinx provides connectivity to plant floor devices for Rockwell software applications. To register a device on the network, product specific information must be supplied via an Electronic Data Sheet (EDS) file. The RSLinx Hardware Installation Tool parses the EDS file containing the hardware’s specifications.
Common Vulnerability Scoring System (CVSS) Score
Overall CVSS Score: 6.2
- CVSS Base Score: 6.9
- Impact Subscore: 10
- Exploitability Subscore: 3.4
- CVSS Temporal Score: 6.2
- CVSS Environmental Score: Organization Defined
Shorthand CVSS Scoring Notation: AV:L/AC:M/Au:N/C:C/I:C/A:C/E:POC/RL:U/RC:C
This vulnerability is likely exploitable; however, it is not possible without user interaction. An attacker cannot initiate the exploit from a remote machine. The exploit is only triggered when a local user runs the vulnerable application and loads the malformed EDS file.
EXISTENCE OF EXPLOIT
There are currently no known exploits specifically targeting this vulnerability.
Crafting a working exploit for this vulnerability would be difficult. Social engineering is required to convince the user to accept the malformed EDS file. Additional user interaction is needed to load the malformed file. This decreases the likelihood of a successful exploit.
Rockwell Automation recommends customers take the following steps to mitigate risk associated with this vulnerability:
- Restrict physical access to the computer
- Establish policies and procedures such that only authorized individuals have administrative rights on the computer
- Obtain product EDS files from trusted sources (e.g., product vendor).
Rockwell Automation will modify the EDS Hardware Installation Tool to properly handle EDS files and will release the modified version as a patch by May 2010. This modified version will be included in all future releases of RSLinx Classic starting with Version 2.57.
*** BEGIN UPDATE A ***
Rockwell Automation has issued a software patch for the EDS Hardware Installation Tool that addresses this buffer overflow vulnerability. When applied, the patch replaces the RSEds.dll file with the modified Version 22.214.171.124. Future releases of RSLinx Classic, starting with Version 2.57, will include this modified version of the RSEds.dll.
Rockwell has also updated Technote 67272 to include instructions for how to obtain and apply the patch.
*** END UPDATE A ***
In addition, ICS-CERT recommends that users take the following measures to protect themselves from social engineering attacks:
- Do not click web links or open unsolicited attachments in e-mail messages
- Refer to Recognizing and Avoiding Email Scams for more information on avoiding e-mail scams.
- Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.
The Control System Security Program also provides a recommended practices section for control systems on the US-CERT website. Several recommended practices are available for reading or download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.