Ecava IntegraXor Path Subversion Arbitrary DLL Injection Code Execution

High Nessus Plugin ID 55026


The remote Windows host contains a SCADA application that allows arbitrary code execution.


The version of IntegraXor installed on the remote host is earlier than 3.60 (Build 4081). As such, it reportedly uses a fixed path to look for specific files or libraries, such as for 'dwmapi.dll', and this path includes directories that may not be trusted or under user control.

If a malicious DLL with the same name as a required DLL is located in the application's current working directory, the malicious DLL will be loaded.


Upgrade to version 3.60.4081.0 or later.

See Also

Plugin Details

Severity: High

ID: 55026

File Name: scada_integraxor_3_60_4081.nbin

Version: $Revision: 1.20 $

Type: local

Family: SCADA

Published: 2011/06/09

Modified: 2018/01/29

Dependencies: 53548

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 8.4

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:W/RC:ND

Vulnerability Information

Required KB Items: SCADA/Apps/Ecava/IntegraXor/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/05/17

Vulnerability Publication Date: 2010/12/22

Exploitable With

Core Impact

Reference Information

CVE: CVE-2010-4599

BID: 45549

OSVDB: 69948

ICS-ALERT: 11-147-01A