Services Vulnerabilities Exploits Publications News Blog About DSecRG

[DSECRG-12-005] wellintech KingSCADA 3.0 - Insecure password encryption

It is possible to obtain cleartext password to access KingSCADA because it is stored insecurely.

Digital Security Research Group [DSecRG] Advisory #DSECRG-00247

Application: WellinTech KingSCADA
Versions Affected: WellinTech KingSCADA 3.0 maybe others
Vendor URL:
Bugs: Insecure password storage
Exploits: YES
Reported: 02.12.2011
Vendor response: NO
Date of Public Advisory:
Author: Alexandr Polyakov and Alexey Sintsov from DSecRG (research center of ERPScan)

It is possible to obtain password to access KingSCADA because it is stored insecurely.


Password is stored in user.db file in Base64 format.

It can be easily decoded if the attacker has access to SCADA server.

Also, if KingSCADA OPCServer and OPCClient are not on the same node, anonymous access to disc using DCOM is enabled.

from documentation:
"Launch and Activation Permissions a Edit Limits (I)àö
Set Local Launch, Remote Launch, Local Activation and Remote Activation Permissions for ANONYMOUS LOGON as allow.
Set Local Launch, Remote Launch, Local Activation and Remote Activation Permissions for EVERYONE as allow"

It means that an attacker can get password remotely.


Fix Information

Use strong hash algorithms to store passwords.

About DSecRG
The main mission of DSecRG is to conduct researches of business critical systems such as ERP, CRM, SRM, BI, SCADA, banking software and others. The result of this work is then integrated in ERPScan Security Scanner. Being on the top edge of ERP and SAP security DSecRG research helps to improve quality of ERPScan consulting services and protects you from the latest threats.
Contact: research [at] dsecrg [dot] com

About ERPScan
ERPScan is an innovative company engaged in the research of ERP security. It develops products for ERP system security assessment. Apart from this, the company provides consulting services for secure configuration, development and implementation of ERP systems, and conducts comprehensive assessment and penetration testing of custom solutions.
Our flagship products are "ERPScan Security Scanner for SAP" and "ERPScan Online" service which can help customers to perform automated security assessments and compliance checks for SAP solutions.

Contact: info [at] erpscan [dot] com

Vulnerabilities RSS RSS
[DSECRG-12-019] vCenter Orchestrator - password disclosure

[DSECRG-12-018] Oracle Application Server - multiple security vulnerabilities

[DSECRG-12-017] ASUS Net4Switch ipswcom.dll ActiveX - buffer overflow vulnerability

[DSECRG-12-016] SAP MessagingSystem - information disclosure

[DSECRG-12-014] SAP Internet Sales - XSS

[DSECRG-12-015] SAP Adapter Monitor - information disclosure

Vulnerabilities list

© 2002—2014, ERPScan
For quoting or using materials from this site
link is obligatory

+44 (20) 81334493    e-mail:
Rss: Vulnerabilities, Exploits, News, Publications, Summary