CISA warns of high-severity flaws in Fuji Electric Tellus Lite V-Simulator and Server Lite | xxxCISA warns of high-severity flaws in Fuji Electric Tellus Lite V-Simulator and Server Lite – xxx
菜单

CISA warns of high-severity flaws in Fuji Electric Tellus Lite V-Simulator and Server Lite

一月 27, 2021 - SecurityAffairs

The U.S. CISA published a security advisory for High-Severity flaws in some SCADA/HMI products made by Japanese company Fuji Electric.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a security advisory to warn industrial organizations of some high severity flaws in SCADA/HMI products made by Japanese electrical equipment company Fuji Electric.

The vulnerabilities affect the Tellus Lite V-Simulator (Versions prior to v4.0.10.0) and Server Lite (Versions prior to v4.0.10.0).

Telus and V-Server SCADA/HMI allow organizations to remotely monitor and control equipment in a factory, they are widely adopted in the critical manufacturing sector.

The vulnerabilities included in the advisory are Stack-based Buffer Overflow, Out-of-Bounds Read, Out-of-Bounds Write, Access of Uninitialized Pointer, and Heap-based Buffer Overflow issues that can be exploited by an attacker to execute arbitrary code on vulnerable installs. An attacker can trigger the flaws by tricking the target user into opening a malicious project file.

“Successful exploitation of these vulnerabilities could allow an attacker to execute code under the privileges of the application.” reads the CISA advisory.

The flaws were reported to the Japanese vendor Kimiya, by Khangkito – Tran Van Khang of VinCSS (Member of Vingroup), and an anonymous researcher through Trend Micro’s Zero Day Initiative (ZDI) and CISA,

All the flaws, tracked CVE-2021-22637, CVE-2021-22655, CVE-2021-22653, CVE-2021-22639, CVE-2021-22641 respectively, received a CVSS v3 base score of 7.8.

According to the advisory published by the Zero Day Initiative, the issue results from the lack of proper validation of user-supplied data, which can trigger a buffer overflow and consequent arbitrary code execution.

The issue has been disclosed publicly because the vendor did not address it in accordance with the ZDI 120 day deadline

If you want to receive the weekly Security Affairs Newsletter for free subscribe here.

Pierluigi Paganini

(SecurityAffairs – hacking, HMI)


Share On

CISA warns of high-severity flaws in Fuji Electric Tellus Lite V-Simulator and Server Lite
Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at “Cyber Defense Magazine”, Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog “Security Affairs” recently named a Top National Security Resource for US. Pierluigi is a member of the “The Hacker News” team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books “The Deep Dark Web” and “Digital Virtual Currency and Bitcoin”.

The U.S. CISA published a security advisory for High-Severity flaws in some SCADA/HMI products made by Japanese company Fuji Electric.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a security advisory to warn industrial organizations of some high severity flaws in SCADA/HMI products made by Japanese electrical equipment company Fuji Electric.

The vulnerabilities affect the Tellus Lite V-Simulator (Versions prior to v4.0.10.0) and Server Lite (Versions prior to v4.0.10.0).

Telus and V-Server SCADA/HMI allow organizations to remotely monitor and control equipment in a factory, they are widely adopted in the critical manufacturing sector.

The vulnerabilities included in the advisory are Stack-based Buffer Overflow, Out-of-Bounds Read, Out-of-Bounds Write, Access of Uninitialized Pointer, and Heap-based Buffer Overflow issues that can be exploited by an attacker to execute arbitrary code on vulnerable installs. An attacker can trigger the flaws by tricking the target user into opening a malicious project file.

“Successful exploitation of these vulnerabilities could allow an attacker to execute code under the privileges of the application.” reads the CISA advisory.

The flaws were reported to the Japanese vendor Kimiya, by Khangkito – Tran Van Khang of VinCSS (Member of Vingroup), and an anonymous researcher through Trend Micro’s Zero Day Initiative (ZDI) and CISA,

All the flaws, tracked CVE-2021-22637, CVE-2021-22655, CVE-2021-22653, CVE-2021-22639, CVE-2021-22641 respectively, received a CVSS v3 base score of 7.8.

According to the advisory published by the Zero Day Initiative, the issue results from the lack of proper validation of user-supplied data, which can trigger a buffer overflow and consequent arbitrary code execution.

The issue has been disclosed publicly because the vendor did not address it in accordance with the ZDI 120 day deadline

If you want to receive the weekly Security Affairs Newsletter for free subscribe here.

Pierluigi Paganini

(SecurityAffairs – hacking, HMI)

Share this…
CISA warns of high-severity flaws in Fuji Electric Tellus Lite V-Simulator and Server Lite

Facebook

CISA warns of high-severity flaws in Fuji Electric Tellus Lite V-Simulator and Server Lite

Twitter

CISA warns of high-severity flaws in Fuji Electric Tellus Lite V-Simulator and Server Lite

Linkedin

CISA warns of high-severity flaws in Fuji Electric Tellus Lite V-Simulator and Server Lite

Reddit

CISA warns of high-severity flaws in Fuji Electric Tellus Lite V-Simulator and Server Lite

Pinterest


Share On


Notice: Undefined variable: canUpdate in /var/www/html/wordpress/wp-content/plugins/wp-autopost-pro/wp-autopost-function.php on line 51