» » Several Horner PLC Software Vulnerabilities Allow Code Execution via Malicious Font Files

Several Horner PLC Software Vulnerabilities Allow Code Execution via Malicious Font Files

Several Horner PLC Software Vulnerabilities Allow Code Execution via Malicious Font Files

Dwelling › ICS/OT

A number of Horner PLC Software program Vulnerabilities Permit Code Execution through Malicious Font Information

By Eduard Kovacs on October 10, 2022

Tweet

A cybersecurity researcher has found a complete of seven high-severity distant code execution vulnerabilities in Horner Automation’s Cscape product and so they can all be exploited utilizing malicious font recordsdata.

Horner Automation is a US-based firm that gives options for industrial course of and constructing automation. Its Cscape programmable logic controller (PLC) software program supplies ladder diagram programming and operator interface growth capabilities. In response to the US Cybersecurity and Infrastructure Safety Company (CISA), Cscape is used worldwide, together with within the important manufacturing sector.

Researcher Michael Heinzl has found seven vulnerabilities in Cscape: 4 in 2021 and three in 2022. The primary spherical of vulnerabilities was disclosed in Might 2022, and CISA and the researcher revealed advisories for the second spherical of vulnerabilities in early October. In response to CISA, the seller has launched updates that ought to patch all of those safety holes.

Heinzl described the vulnerabilities as heap-based buffer overflow, out-of-bounds learn/write, and uninitialized pointer points associated to improper validation of user-supplied knowledge when the appliance parses fonts.

An attacker can exploit the failings to execute arbitrary code within the context of the present course of by getting a person to open a specifically crafted font file. The researcher instructed SecurityWeek that the appliance does embrace particular options for coping with fonts. This will improve an attacker’s probabilities of getting a person to open the malicious recordsdata utilizing social engineering methods.

Opening a malicious font file can lead to the attacker’s code getting executed with the privileges of the person who launched the appliance.

These aren’t the one industrial management system (ICS) vulnerabilities recognized by Heinzl. Prior to now two years, the researcher disclosed flaws present in industrial merchandise made by Elcomplus, the CX-Programmer PLC programming software program from Omron, Fuji Electrical’s Tellus manufacturing facility monitoring and working product, Delta Electronics’ DIAEnergie industrial power administration system, and the myPRO HMI/SCADA product of mySCADA.

Associated: Russia-Linked Pipedream/Incontroller ICS Malware Designed to Goal Vitality Services

Associated: ICS Patch Tuesday: Siemens, Schneider Repair A number of Important Vulnerabilities

Associated: Important Vulnerabilities Present in Sealevel Gadget Utilized in ICS Atmosphere

Get the Each day Briefing

 
 
 

  • Most Latest
  • Most Learn
  • US Airport Web sites Hit by Suspected Professional-Russian Cyberattacks
  • Endor Labs Joins Race to Safe Software program Provide Chain
  • State Bar of Georgia Confirms Information Breach Following Ransomware Assault
  • Important Zimbra RCE Vulnerability Exploited in Assaults
  • A number of Horner PLC Software program Vulnerabilities Permit Code Execution through Malicious Font Information
  • Second Australia-Primarily based Singtel Subsidiary Hacked
  • Important Distant Code Execution Vulnerability Present in vm2 Sandbox Library
  • Android Safety Updates Patch Important Vulnerabilities
  • Fortinet Prospects Informed to Urgently Patch Remotely Exploitable Vulnerability
  • Menace Modeling Agency IriusRisk Raises $29 Million

In search of Malware in All of the Incorrect Locations?

First Step For The Web’s subsequent 25 years: Including Safety to the DNS

Tattle Story: What Your Pc Says About You

Be in a Place to Act Via Cyber Situational Consciousness

Report Exhibits Closely Regulated Industries Letting Social Networking Apps Run Rampant

2010, A Nice 12 months To Be a Scammer.

Do not Let DNS be Your Single Level of Failure

The way to Determine Malware in a Blink

Defining and Debating Cyber Warfare

The 5 A’s that Make Cybercrime so Engaging

The way to Defend In opposition to DDoS Assaults

Safety Budgets Not in Line with Threats

Anycast – Three Causes Why Your DNS Community Ought to Use It

The Evolution of the Prolonged Enterprise: Safety Methods for Ahead Pondering Organizations

Utilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous Enterprise

author-Orbit Brain
Orbit Brain
Orbit Brain is the senior science writer and technology expert. Our aim provides the best information about technology and web development designing SEO graphics designing video animation tutorials and how to use software easy ways
and much more. Like Best Service Latest Technology, Information Technology, Personal Tech Blogs, Technology Blog Topics, Technology Blogs For Students, Futurism Blog.

Cyber Security News Related Articles