SCADA Engine BACnet OPC Server < 2.1.371.24 Multiple Vulnerabilities

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

An application running on the remote host is affected by multiple
vulnerabilities.

Description :

The remote host is running a version of SCADA Engine BACnet OPC Server
prior to version 2.1.371.24. It is, therefore, affected by multiple
vulnerabilities :

- A heap-based buffer overflow exists in the SOAP web
interface, which a remote attacker, using a specially
crafted packet, can exploit to execute arbitrary code
or crash the service. (CVE-2015-0979)

- An vulnerability exists in 'BACnetOPCServer.exe' due to
not properly sanitizing user-supplied input. A remote
attacker, using format string specifiers, can exploit
this to execute arbitrary code or crash the service.
(CVE-2015-0980)

- An authentication bypass flaw exists in the SOAP web
interface, which allows a remote attacker to read or
write or delete arbitrary database fields.
(CVE-2015-0981)

See also :

https://ics-cert.us-cert.gov/advisories/ICSA-15-069-03

Solution :

Upgrade to SCADA Engine BACnet OPC Server 2.1.371.24 or later.

Risk factor :

High / CVSS Base Score : 9.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:C)

Family: SCADA

Nessus Plugin ID: 82664 ()

Bugtraq ID: 73022
73024
73028

CVE ID: CVE-2015-0979
CVE-2015-0980
CVE-2015-0981

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now