ICS Alert

Rockwell Automation RSLogix Overflow Vulnerability (UPDATE A)

Last Revised
Alert Code
ICS-ALERT-11-256-05A

Description

This September 2011 alert is a follow-up to the original ICS-CERT Alert titled “ICS-ALERT-11-256-05-ROCKWELL RSLOGIX OVERFLOW VULNERABILITY” that was published September 13, 2011.

table.gridtable {
font-family: verdana,arial,sans-serif;
font-size:11px;
color:#333333;
border-width: 1px;
border-color: #666666;
border-collapse: collapse;
}
table.gridtable th {
border-width: 1px;
padding: 8px;
border-style: solid;
border-color: #666666;
background-color: #dedede;
}
table.gridtable td {
border-width: 1px;
padding: 8px;
border-style: solid;
border-color: #666666;
background-color: #ffffff;
}

Summary

This Alert Update is a follow-up to the original ICS-CERT Alert titled “ICS-ALERT-11-256-05—ROCKWELL RSLOGIX OVERFLOW VULNERABILITY” that was published September 13, 2011, on the ICS-CERT web page.

ICS-CERT is aware of a public report of an overflow vulnerability with proof-of-concept (POC) exploit code affecting the Rockwell RSLogix 5000, Version 19. According to this report, services running on Port 4446 are vulnerable to a memory overflow. This report was released without coordination with either the vendor or ICS-CERT.

ICS-CERT has not yet verified the vulnerabilities or POC code, but has reached out to the affected vendor to notify, confirm, and identify mitigations. ICS-CERT is issuing this alert to provide early notice of the report and identify baseline mitigations for reducing risks to these and other cybersecurity attacks.

----- BEGIN UPDATE 1 of 3 -----

Rockwell has released the following advisories:

Security Advisory Index: http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102

FactoryTalk RnaUtility.dll Vulnerability September 16, 2011, Advisory: http://rockwellautomation.custhelp.com/app/answers/detail/a_id/456144

----- END UPDATE 1 of 3 -----

The report included vulnerability details and POC exploit code for the following vulnerability:

Vulnerability Type Exploitabililty Impact
Overflow Remote Denial of Service
Text 2A Text 2B Text 2C

Please report any issues affecting control systems in critical infrastructure environments to ICS-CERT.

Background

Rockwell Automation provides industrial automation control and information products worldwide, across a wide range of industries.

The Rockwell RSLogix family is a group of ladder logic programming packages that operates on
Microsoft Windows operating systems.

----- BEGIN UPDATE 2 of 3 -----

RSLogix 5000 supports the Allen-Bradley ControlLogix and GuardLogix family of programmable
controllers.

----- END UPDATE 2 of 3 -----

Follow-Up

ICS-CERT released a follow-up advisory, ICSA-11-273-03 - Rockwell RSLogix Overflow Vulnerability, on September 30, 2011.

Mitigations

Mitigation

----- BEGIN UPDATE 3 of 3 -----

Rockwell Automation is aware of this vulnerability and plans to release a software patch within 14 days. Rockwell recommends configuring firewalls to block the following TCP ports to prevent traversal of RNA messages in and out of the ICS system:

  • 1330
  • 1331
  • 1332
  • 4241
  • 4242
  • 4446
  • 6543
  • 9111
  • 60093
  • 49281.

Rockwell also recommends users evaluate firewall configurations to ensure other appropriate inbound and
outbound traffic is blocked.

MITRE has assigned number CVE-2011-3489 to this vulnerability.

----- END UPDATE 3 of 3 -----

ICS-CERT recommends that users take defensive measures to minimize the risk of exploitation of these
vulnerabilities. Specifically, users should:

  • Minimize network exposure for all control system devices. Control system devices should not directly face the Internet.a
  • Locate control system networks and devices behind firewalls, and isolate them from the business network.
  • If remote access is required, employ secure methods such as Virtual Private Networks (VPNs).

ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to taking defensive measures.

The Control System Security Program also provides a recommended practices section for control systems on the US-CERT website. Several recommended practices are available for reading or download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

Organizations that observe any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents.

This product is provided subject to this Notification and this Privacy & Use policy.

Vendor

  • Rockwell Automation