Several Critical Vulnerabilities Found in myPRO HMI/SCADA Product

A researcher has found a dozen vulnerabilities in the myPRO product of Czech industrial automation company mySCADA, including several flaws that have been assigned a critical severity rating.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued two advisories to inform organizations about these vulnerabilities — one advisory was released in August and one on December 21.

The researcher who discovered the security holes, Michael Heinzl, has also made available advisories describing each issue.

myPRO HMI SCADA vulnerabilitiesmyPRO is a human-machine interface (HMI) and supervisory control and data acquisition (SCADA) system designed for visualizing and controlling industrial processes. The product can run on Windows, macOS and Linux, including servers, PCs and even embedded devices.

According to CISA, the affected product is used worldwide in the energy, food and agriculture, water, and transportation systems sectors. Information provided on the vendor’s website shows that most of its customers are in Europe.

The first round of vulnerabilities found by Heinzl was patched in July with the release of version 8.20.0, while the second round of flaws was patched in early November with the release of version 8.22.0. In both cases, the vendor specified that they were security updates — this is noteworthy, considering that some ICS vendors bury security patches in larger updates, leaving customers unaware of the potential risks.

Version 8.20.0 patches four high-severity vulnerabilities that can be exploited to obtain sensitive information or to upload arbitrary files remotely and without authentication. Version 8.22.0 fixes eight flaws, seven of which are critical. One of the critical bugs can be used to bypass authentication and one is related to a backdoor account, while the rest can be exploited by a remote, unauthenticated attacker for OS command injection.

Heinzl told SecurityWeek that the impacted application is executed on system startup with elevated privileges, and by default it listens on TCP ports 80/443 on all network interfaces. A remote, unauthenticated attacker can exploit the flaws to take complete control of the product, as well as the underlying system.

The researcher noted that it may be possible to exploit the vulnerabilities directly from the internet under certain system and infrastructure configurations.

Heinzl has identified security holes in many industrial products this year, including ones from Delta Electronics and Fuji Electric.

Related: Serious Vulnerabilities Found in Wi-Fi Module Designed for Critical Industrial Applications

Related: IoT Protocol Used by NASA, Siemens and Volkswagen Can Be Exploited by Hackers

view counter

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Previous Columns by Eduard Kovacs:

Don't forget to share

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *