SB2022081709 - Multiple vulnerabilities in Emerson Proficy Machine Edition
Published: August 17, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Missing Support for Integrity Check (CVE-ID: CVE-2022-2793)
The vulnerability allows a local attacker to compromise the target system.
The vulnerability exists due to improper authentication or authorization of data packets after establishing a connection for the SRTP protocol. An attacker with physical access can bypass authentication on the target system.
2) Improper access control (CVE-ID: CVE-2022-2792)
The vulnerability allows a local user to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to the affected application stores project data in a directory with improper access control lists. A local user can bypass implemented security restrictions and gain unauthorized access to the application.
3) Arbitrary file upload (CVE-ID: CVE-2022-2791)
The vulnerability allows a local user to compromise vulnerable system.
The vulnerability exists due to the affected application will upload any file written into the PLC logic folder to the connected PLC. A local user can upload a malicious file and execute it on the server.
4) Improper Verification of Cryptographic Signature (CVE-ID: CVE-2022-2790)
The vulnerability allows a local user to compromise the target system.
The vulnerability exists due to the affected application does not properly verify compiled logic (PDT files) and data blocks data (BLD/BLK files). A local user can bypass authentication on the target system.
5) Insufficient verification of data authenticity (CVE-ID: CVE-2022-2789)
The vulnerability allows a local attacker to compromise the target system.
The vulnerability exists due to the affected product can display logic that is different than the compiled logic. A local attacker can bypass authentication on the target system.
6) Path traversal (CVE-ID: CVE-2022-2788)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker can perform a ZipSlip attack through an upload procedure and execute arbitrary code on the target system.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.