Rewterz Threat Update – Log4Shell Exploited in Cyber Attack Against Belgian Defense Ministry
December 21, 2021Rewterz Threat Advisory – ICS: Emerson DeltaV
December 22, 2021Rewterz Threat Update – Log4Shell Exploited in Cyber Attack Against Belgian Defense Ministry
December 21, 2021Rewterz Threat Advisory – ICS: Emerson DeltaV
December 22, 2021Severity
High
Analysis Summary
CVE-2021-43985
An unauthenticated remote attacker can access the application without any form of authentication or authorization.
CVE-2021-43989
The affected product stores password using MD5, which may allow an attacker to crack the previously retrieved password hashes.
CVE-2021-43987
An additional, nondocumented administrative account exists in the affected product that is not exposed through the web interface, which cannot be deleted or changed through the regular web interface.
CVE-2021-44453
The affected product has a vulnerable debug interface which includes a ping utility, which may allow an attacker to inject arbitrary operating system commands.
CVE-2021-22657
The affected product has a feature where the API password can be specified, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.
CVE-2021-23198
The affected product has a feature where the password can be specified, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.
CVE-2021-43981
The affected product has a feature to send emails, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.
CVE-2021-43984
The affected product has a feature where the firmware can be updated, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.
Impact
- Unauthorized Access
- Credential Theft
Affected Vendors
- mySCADA
Affected Products
myPRO: Versions 8.20.0 and prior
Remediation
Refer to CISA Advisory for the patch, upgrade, or suggested workaround information.