Zero-day vulnerability in SIMATIC STEP 7

DDL hijacking
CVE-2012-3015

The vulnerability was used by Stuxnet along with CVE-2010-2772.

Known malware:

Stuxnet

Vulnerability details

Advisory: SB2012072401 - Insecure DLL loading in SIMATIC STEP 7 and PCS 7

Vulnerable component: SIMATIC STEP 7

CVE-ID: CVE-2012-3015

CVSSv3 score: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C

CWE-ID: CWE-426 - Untrusted Search Path

Description:

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to insecure DDL loading mechanism when processing STEP 7 files in SIMATIC STEP 7 and SIMATIC PCS 7 software. A remote attacker can trick the victim into opening a SETP 7 file from a remote SMB or WebDAV share, which hosts malicious .dll file, and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Note: the vulnerability has been exploited in the wild by Stuxnet malware in 2010.

Known APT campaigns:

Iranian Nuclear Facilities breach

The breach was identified in summer 2010 by VirusBlokada antivirus company from Belarus, who was called to investigate computers in Iranian nuclear facilities.

Vulnerability Scanning SaaS

Vulnerability scanning SaaS service is online 3-rd generation vulnerability scanner with scheduled assessments and vulnerability subscription. You can use service to check security of your network perimeter.