Services Vulnerabilities Exploits Publications News Blog About DSecRG


[DSECRG-12-005] wellintech KingSCADA 3.0 - Insecure password encryption

It is possible to obtain cleartext password to access KingSCADA because it is stored insecurely.

Digital Security Research Group [DSecRG] Advisory #DSECRG-00247

Application: WellinTech KingSCADA
Versions Affected: WellinTech KingSCADA 3.0 maybe others
Vendor URL: http://en.wellintech.com/
Bugs: Insecure password storage
Exploits: YES
Reported: 02.12.2011
Vendor response: NO
Date of Public Advisory:
CVE-number:
Author: Alexandr Polyakov and Alexey Sintsov from DSecRG (research center of ERPScan)


Description
***********
It is possible to obtain password to access KingSCADA because it is stored insecurely.


Details
*******

Password is stored in user.db file in Base64 format.

It can be easily decoded if the attacker has access to SCADA server.

Also, if KingSCADA OPCServer and OPCClient are not on the same node, anonymous access to disc using DCOM is enabled.

from documentation:
"Launch and Activation Permissions a Edit Limits (I)àö
Set Local Launch, Remote Launch, Local Activation and Remote Activation Permissions for ANONYMOUS LOGON as allow.
Set Local Launch, Remote Launch, Local Activation and Remote Activation Permissions for EVERYONE as allow"


It means that an attacker can get password remotely.


References
**********
http://dsecrg.com/pages/vul/show.php?id=405

Fix Information
***************

Use strong hash algorithms to store passwords.


About DSecRG
*******
The main mission of DSecRG is to conduct researches of business critical systems such as ERP, CRM, SRM, BI, SCADA, banking software and others. The result of this work is then integrated in ERPScan Security Scanner. Being on the top edge of ERP and SAP security DSecRG research helps to improve quality of ERPScan consulting services and protects you from the latest threats.
Contact: research [at] dsecrg [dot] com
http://www.dsecrg.com

About ERPScan
*******
ERPScan is an innovative company engaged in the research of ERP security. It develops products for ERP system security assessment. Apart from this, the company provides consulting services for secure configuration, development and implementation of ERP systems, and conducts comprehensive assessment and penetration testing of custom solutions.
Our flagship products are "ERPScan Security Scanner for SAP" and "ERPScan Online" service which can help customers to perform automated security assessments and compliance checks for SAP solutions.

Contact: info [at] erpscan [dot] com
http://www.erpscan.com

Vulnerabilities RSS RSS
21.03.2012
[DSECRG-12-019] vCenter Orchestrator - password disclosure

22.02.2012
[DSECRG-12-018] Oracle Application Server - multiple security vulnerabilities

17.02.2012
[DSECRG-12-017] ASUS Net4Switch ipswcom.dll ActiveX - buffer overflow vulnerability

17.02.2012
[DSECRG-12-016] SAP MessagingSystem - information disclosure

17.02.2012
[DSECRG-12-014] SAP Internet Sales - XSS

17.02.2012
[DSECRG-12-015] SAP Adapter Monitor - information disclosure

Vulnerabilities list


© 2002—2014, ERPScan
For quoting or using materials from this site
link is obligatory

+44 (20) 81334493    e-mail: research@dsecrg.com
Rss: Vulnerabilities, Exploits, News, Publications, Summary
Search