SB2022081709 - Multiple vulnerabilities in Emerson Proficy Machine Edition



SB2022081709 - Multiple vulnerabilities in Emerson Proficy Machine Edition

Published: August 17, 2022

Security Bulletin ID SB2022081709
Severity
High
Patch available
NO
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 17% Low 83%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 secuirty vulnerabilities.


1) Missing Support for Integrity Check (CVE-ID: CVE-2022-2793)

The vulnerability allows a local attacker to compromise the target system.

The vulnerability exists due to improper authentication or authorization of data packets after establishing a connection for the SRTP protocol. An attacker with physical access can bypass authentication on the target system.


2) Improper access control (CVE-ID: CVE-2022-2792)

The vulnerability allows a local user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to the affected application stores project data in a directory with improper access control lists. A local user can bypass implemented security restrictions and gain unauthorized access to the application.


3) Arbitrary file upload (CVE-ID: CVE-2022-2791)

The vulnerability allows a local user to compromise vulnerable system.

The vulnerability exists due to the affected application will upload any file written into the PLC logic folder to the connected PLC. A local user can upload a malicious file and execute it on the server.


4) Improper Verification of Cryptographic Signature (CVE-ID: CVE-2022-2790)

The vulnerability allows a local user to compromise the target system.

The vulnerability exists due to the affected application does not properly verify compiled logic (PDT files) and data blocks data (BLD/BLK files). A local user can bypass authentication on the target system.


5) Insufficient verification of data authenticity (CVE-ID: CVE-2022-2789)

The vulnerability allows a local attacker to compromise the target system.

The vulnerability exists due to the affected product can display logic that is different than the compiled logic. A local attacker can bypass authentication on the target system.


6) Path traversal (CVE-ID: CVE-2022-2788)

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker can perform a ZipSlip attack through an upload procedure and execute arbitrary code on the target system.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.