{ "document": { "acknowledgments": [ { "names": [ "Sharon Brizinov" ], "organization": "Claroty", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow code execution, memory corruption, or unauthorized access to user information.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing, Energy, Water and Wastewater Systems", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "United States and Europe", "title": "Countries/areas deployed" }, { "category": "other", "text": "United States", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities. These vulnerabilities are not exploitable remotely.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-21-308-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-308-02.json" }, { "category": "self", "summary": "ICS Advisory ICSA-21-308-02 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-308-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/ics/tips/ICS-TIP-12-146-01B" } ], "title": "AzeoTech DAQFactory", "tracking": { "current_release_date": "2021-11-04T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-21-308-02", "initial_release_date": "2021-11-04T00:00:00.000000Z", "revision_history": [ { "date": "2021-11-04T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-21-308-02 AzeoTech DAQFactory" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "< 18.1 Build 2347", "product": { "name": "DAQFactory: All Versions 18.1 Build 2347 and prior", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "DAQFactory" } ], "category": "vendor", "name": "AzeoTech" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-42543", "cwe": { "id": "CWE-242", "name": "Use of Inherently Dangerous Function" }, "notes": [ { "category": "summary", "text": "The affected application uses specific functions that could be abused through a crafted project file, which could lead to code execution, system reboot, and system shutdown.CVE-2021-42543 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-42543" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Users are discouraged from using documents from unknown/untrusted sources.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Users are encouraged to store .ctl files in a folder only writeable by admin-level users.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Users are encouraged to operate in “Safe Mode” when loading documents that have been out of their control.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Users are encouraged to apply a document editing password to their documents.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Users should avoid using the Real Time Web-Connect menu items and instead connect to DAQConnect using script.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-42698", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "summary", "text": "Project files are stored memory objects in the form of binary serialized data that can later be read and deserialized again to instantiate the original objects in memory. Malicious manipulation of these files may allow an attacker to corrupt memory.CVE-2021-42698 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-42698" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Users are discouraged from using documents from unknown/untrusted sources.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Users are encouraged to store .ctl files in a folder only writeable by admin-level users.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Users are encouraged to operate in “Safe Mode” when loading documents that have been out of their control.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Users are encouraged to apply a document editing password to their documents.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Users should avoid using the Real Time Web-Connect menu items and instead connect to DAQConnect using script.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-42699", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "The affected product is vulnerable to cookie information being transmitted as cleartext over HTTP. An attacker can capture network traffic, obtain the user 's cookie and take over the account.CVE-2021-42699 has been assigned to this vulnerability. A CVSS v3 base score of 5.7 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-42699" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Users are discouraged from using documents from unknown/untrusted sources.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Users are encouraged to store .ctl files in a folder only writeable by admin-level users.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Users are encouraged to operate in “Safe Mode” when loading documents that have been out of their control.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Users are encouraged to apply a document editing password to their documents.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Users should avoid using the Real Time Web-Connect menu items and instead connect to DAQConnect using script.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-42701", "cwe": { "id": "CWE-471", "name": "Modification of Assumed-Immutable Data (MAID)" }, "notes": [ { "category": "summary", "text": "An attacker could prepare a specially crafted project file that, if opened, would attempt to connect to the cloud and trigger a man in the middle (MiTM) attack. This could allow an attacker to obtain credentials and take over the user 's cloud account.CVE-2021-42701 has been assigned to this vulnerability. A CVSS v3 base score of 5.0 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-42701" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Users are discouraged from using documents from unknown/untrusted sources.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Users are encouraged to store .ctl files in a folder only writeable by admin-level users.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Users are encouraged to operate in “Safe Mode” when loading documents that have been out of their control.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Users are encouraged to apply a document editing password to their documents.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Users should avoid using the Real Time Web-Connect menu items and instead connect to DAQConnect using script.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] } ] }