OTPulse

IOServer OPC Server Multiple Vulnerabilities

Low RiskICS-CERT ICSA-12-258-01Jun 18, 2012
Summary

IOServer OPC Server versions 1.0.18.0 and earlier contain multiple vulnerabilities related to path traversal (CWE-22). These vulnerabilities allow unauthorized access to files and resources on systems running affected OPC Server instances.

What this means
What could happen
An attacker could read, write, or delete arbitrary files on a system running the OPC Server, potentially compromising configuration files, historical data, or other critical files that OPC clients depend on for process automation and monitoring.
Who's at risk
Water utilities and electric utilities that use IOServer OPC Server for SCADA integration and process monitoring. This affects any facility using OPC for real-time communication between engineering workstations, historians, and control systems. Particular concern for organizations running legacy automation environments where the OPC Server acts as a central data broker.
How it could be exploited
An attacker with network access to the OPC Server could craft malicious requests using path traversal sequences (such as ../ or encoded variants) to access files outside the intended directory structure. If the OPC Server handles file operations without proper input validation, the attacker could retrieve sensitive files or modify them to disrupt operations.
Prerequisites
  • Network access to the OPC Server port
  • OPC Server version 1.0.18.0 or earlier installed
remotely exploitablepath traversal vulnerabilityno patch availableaffects automation infrastructure
Exploitability
Moderate exploit probability (EPSS 8.5%)
Affected products (1)
ProductAffected VersionsFix Status
OPC Server: <=1.0.18.0≤ 1.0.18.0No fix (EOL)
Remediation & Mitigation
0/4
Do now
0/2
HARDENINGIsolate or air-gap the OPC Server from untrusted networks. Restrict network access to the OPC Server port to only authorized engineering workstations and control system clients using firewall rules.
HARDENINGMonitor network traffic to and from the OPC Server for suspicious activity, including requests with path traversal patterns (../, ..\, encoded sequences).
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

WORKAROUNDDisable OPC Server if it is not actively used for operations. If the service is not critical, consider removing it from production systems.
Mitigations - no patch available
0/1
OPC Server: <=1.0.18.0 has reached End of Life. The vendor will not release a patch. Apply the following compensating controls:
HARDENINGContact the vendor to inquire about migration to a patched OPC Server version or supported alternative. Given that no fix is available, evaluate long-term replacement of this product.
↑↓ Navigate · Esc Close
API: /api/v1/advisories/d200a186-22e8-44cf-a5ba-fe0f89302ea0