9 security flaws have been disclosed in electric electrical power management goods created by Schweitzer Engineering Laboratories (SEL).
“The most extreme of people 9 vulnerabilities would permit a risk actor to facilitate remote code execution (RCE) on an engineering workstation,” Nozomi Networks mentioned in a report published last 7 days.
The issues, tracked as CVE-2023-34392 and from CVE-2023-31168 as a result of CVE-2023-31175, have CVSS severity scores ranging from 4.8 to 8.8 and effect SEL-5030 acSELeratorQuickSet and SEL-5037 GridConfigurator, which are used to commission, configure, and keep track of the equipment.
Exploitation of CVE-2023-31171 could be attained by sending a phishing email that tips a victim engineer into importing a specially crafted configuration file to attain arbitrary code execution on the engineering workstation working the SEL computer software.
What is actually more, the shortcoming can be chained with CVE-2023-31175 to obtain administrative privileges on the goal workstation. CVE-2023-34392, on the other hand, could be weaponized by an adversary to stealthily deliver arbitrary commands to the equipment by suggests of a watering gap attack.
Information of nine flaws adds to 19 security vulnerabilities beforehand documented in the SEL Authentic Time Automation Controller (RTAC) suite (from CVE-2023-31148 via CVE-2023-31166) that could be exploited to “get hold of unauthorized accessibility to the web interface, change shown info, manipulate its logic, conduct gentleman-in-the-center (MitM) assaults, or execute arbitrary code.”
In July 2023, the operational technology security organization also adopted on past years’ findings, detecting five new vulnerabilities affecting the American Megatrends (AMI) MegaRAC BMC software program solution that could allow an attacker to obtain reset-resistant persistence and conceal a backdoor on the web-centered BMC management interface.
“This backdoor entry could persist even across reinstallations of the host operating system or difficult resets of the BMC configuration by itself,” Nozomi Networks reported.
Future WEBINARWay Far too Susceptible: Uncovering the Point out of the Identification Attack Surface area
Obtained MFA? PAM? Assistance account safety? Find out how perfectly-equipped your corporation genuinely is in opposition to identity threats
Supercharge Your Skills
Since then, 14 far more security bugs have been unearthed in the Phoenix Make contact with Web Panel 6121-WXPS, together with four critical-severity flaws, that could be exploited by a remote attacker to totally compromise the appliances.
The enhancement arrives as the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has partnered with MITRE to create an extension for the Caldera cyber attack emulation system that’s specially centered close to operational technology (OT) networks.
Uncovered this article fascinating? Follow us on Twitter and LinkedIn to go through more special information we publish.
Some parts of this article are sourced from:
thehackernews.com