Rewterz
Rewterz Threat Update – Log4Shell Exploited in Cyber Attack Against Belgian Defense Ministry
December 21, 2021
Rewterz
Rewterz Threat Advisory – ICS: Emerson DeltaV
December 22, 2021

Rewterz Threat Advisory – ICS: Multiple Hitachi Energy Vulnerabilities

Severity

High

Analysis Summary

CVE-2021-43985

An unauthenticated remote attacker can access the application without any form of authentication or authorization.

CVE-2021-43989

The affected product stores password using MD5, which may allow an attacker to crack the previously retrieved password hashes.

CVE-2021-43987

An additional, nondocumented administrative account exists in the affected product that is not exposed through the web interface, which cannot be deleted or changed through the regular web interface.

CVE-2021-44453

The affected product has a vulnerable debug interface which includes a ping utility, which may allow an attacker to inject arbitrary operating system commands.

CVE-2021-22657

The affected product has a feature where the API password can be specified, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.

CVE-2021-23198

The affected product has a feature where the password can be specified, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.

CVE-2021-43981

The affected product has a feature to send emails, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.

CVE-2021-43984

The affected product has a feature where the firmware can be updated, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.

Impact

  • Unauthorized Access
  • Credential Theft

Affected Vendors

  • mySCADA

Affected Products

myPRO: Versions 8.20.0 and prior

Remediation

Refer to CISA Advisory for the patch, upgrade, or suggested workaround information.

https://www.cisa.gov/uscert/ics/advisories/icsa-21-355-01