PCM600 SharpZip library vulnerability
PCM600 (Protection and Control IED Manager) versions 1.5 through 2.13 contain a path traversal vulnerability in the bundled SharpZip library. An attacker with local access who can convince a user to open a malicious archive file could write arbitrary files to the system and execute code with the privileges of the application user. This could compromise the integrity of relay configurations and engineering data. The issue is resolved in version 2.14, though that version is incompatible with RE_630 protection relays.
- Local access to the PCM600 workstation
- Low privilege user account on the workstation
- User interaction to open a malicious archive file OR automatic processing of archives from an attacker-controlled source
- PCM600 version 1.5 through 2.13 installed
Patching may require device reboot — plan for process interruption
/api/v1/advisories/abe80c32-ce93-41a0-ba3e-578067fce78bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.