Rewterz
Rewterz Threat Advisory – ICS: Mitsubishi Electric MELSEC iQ-R Series C Controller Module
October 8, 2021
Rewterz
Rewterz Threat Alert – DanaBot Trojan – Active IOCs
October 8, 2021

Rewterz Threat Advisory – ICS: FATEK Automation And WinProladder Communication Server

Severity

High

Analysis Summary

CVE-2021-38432

The affected product lacks proper validation of user-supplied data, which could result in a stack-based buffer overflow condition and allow an attacker to remotely execute code.

CVE-2021-38438

A use after free vulnerability may be exploited when a valid user opens a malformed project file, which may allow arbitrary code execution.

CVE-2021-38426

The affected product lacks proper validation of user-supplied data when parsing project files, which could result in an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code.

CVE-2021-38434

The affected product lacks proper validation of user-supplied data when parsing project files, which could result in an unexpected sign extension. An attacker could leverage this vulnerability to execute arbitrary code.

CVE-2021-38430

The affected product lacks proper validation of user-supplied data when parsing project files, which could result in a stack-based buffer overflow. An attacker could leverage this vulnerability to execute arbitrary code.

CVE-2021-38436 

The affected product lacks proper validation of user-supplied data when parsing project files, which could result in a memory corruption condition. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.

CVE-2021-38442

The affected product lacks proper validation of user-supplied data when parsing project files, which could result in a heap-corruption condition. An attacker could leverage this vulnerability to execute code in the context of the current process.

CVE-2021-38440

The affected product is vulnerable to an out-of-bounds read, which may allow an attacker to read unauthorized information.

Impact

  • Remote Code Execution
  • Buffer Overflow
  • Unauthorized Access
  • Information Disclosure

Affected Vendors

FATEK Automation

Affected Products

  • Communication Server: Versions 1.13 and prior
  • WinProladder: Versions 3.30 and prior

Remediation

Refer to US-CERT Advisory for patch, upgrade, or suggested workaround information.

https://us-cert.cisa.gov/ics/advisories/icsa-21-280-07

Refer to US-CERT Advisory for patch, upgrade, or suggested workaround information.

https://us-cert.cisa.gov/ics/advisories/icsa-21-280-06