WellinTech KingSCADA < 3.1.2.13-EN 'kxClientDownload.ocx' ActiveX RCE

high Nessus Plugin ID 83774

Synopsis

The WellinTech KingSCADA server installed on the remote host is affected by a remote code execution vulnerability.

Description

The WellinTech KingSCADA server installed on the remote host is a version prior to 3.1.2.13-EN. It is, therefore, affected by a vulnerability in the 'kxClientDownload.ocx' ActiveX control. A remote attacker, by setting the ProjectURL property, can exploit this to download an arbitrary DLL file from a remote location, thus allowing the injection of executable code.

Solution

Upgrade KingSCADA to version 3.1.2.13-EN.

See Also

https://ics-cert.us-cert.gov/advisories/ICSA-13-344-01

Plugin Details

Severity: High

ID: 83774

File Name: scada_kingscada_kxclientdownload_activex.nbin

Version: 1.263

Type: local

Agent: windows

Family: SCADA

Published: 6/1/2015

Updated: 3/26/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2013-2827

Vulnerability Information

CPE: cpe:/a:wellintech:kingscada

Required KB Items: SMB/Registry/Enumerated, installed_sw/WellinTech KingSCADA

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/14/2014

Vulnerability Publication Date: 1/14/2014

Exploitable With

Core Impact

Metasploit (KingScada kxClientDownload.ocx ActiveX Remote Code Execution)

Reference Information

CVE: CVE-2013-2827

BID: 64941

ICSA: 13-344-01