ABB PCM600 Path Traversal Vulnerability (CVE-2018-1002208)
A path traversal vulnerability in ABB PCM600 versions 1.5 to 2.13 (CVE-2018-1002208) allows a local attacker with low privileges to execute arbitrary code by sending a specially crafted message to the system node.
ABB PCM600 versions 1.5 through 2.13 are vulnerable to a path traversal flaw (CVE-2018-1002208) within the SharpZip.dll library. Successful exploitation enables a local attacker with low privileges to execute arbitrary code on the affected system. This vulnerability resides in the software used to configure and manage protection and control IEDs (Intelligent Electronic Devices) in critical infrastructure sectors, specifically critical manufacturing. ABB recommends updating to PCM600 version 2.14 to remediate this vulnerability. The vulnerability was reported to CISA by ABB PSIRT.
Attack Chain
- Attacker gains low-privilege access to the target system running a vulnerable ABB PCM600 version.
- The attacker crafts a malicious message containing a path traversal payload designed to exploit CVE-2018-1002208.
- The attacker sends the crafted message to the system node, targeting the vulnerable SharpZip.dll.
- The SharpZip.dll processes the message without properly sanitizing the provided path.
- The path traversal vulnerability allows the attacker to write arbitrary files to locations outside the intended directory.
- The attacker leverages the file write capability to place a malicious executable or library in a trusted location.
- The attacker triggers the execution of the malicious code, achieving arbitrary code execution on the system.
- The attacker can then perform actions such as escalating privileges, installing malware, or disrupting industrial processes.
Impact
Successful exploitation of CVE-2018-1002208 can lead to arbitrary code execution on systems running vulnerable ABB PCM600 versions within critical manufacturing environments. While no specific victim counts or sectors are detailed in the advisory, the vulnerability’s presence in industrial control systems poses a significant risk. A successful attack could disrupt manufacturing processes, cause equipment damage, or lead to data breaches.
Recommendation
- Upgrade to ABB Protection and control IED manager PCM600 version 2.14 to address CVE-2018-1002208 as per the vendor’s recommendation.
- If using RE_630 protection relays with older PCM600 versions, implement system-level defenses as described in ABB’s security advisory 2NGA002813.
- Minimize network exposure for all control system devices and systems, ensuring they are not accessible from the internet, as recommended by CISA.
- Monitor file creation events for suspicious file paths that may indicate path traversal attempts exploiting CVE-2018-1002208, using a rule similar to the example provided.
Detection coverage 2
Detect Suspicious File Creation in ABB PCM600 Directories
mediumDetects potential path traversal attempts in ABB PCM600 by monitoring file creation in sensitive directories.
Detect ABB PCM600 Process Launching Unexpected Executables
mediumDetects potential exploitation of ABB PCM600 by monitoring for the process launching executables from unusual locations.
Detection queries are kept inside the platform. Get full rules →