OTPulse

COPA-DATA Improper Input Validation

Low RiskICS-CERT ICSA-14-154-01Mar 6, 2014
Summary

COPA-DATA zenon DNP3 NG driver and DNP3 Process Gateway contain improper input validation (CWE-20) in DNP3 protocol message handling. Affected versions: DNP3 NG driver 7.10_SP0 through 7.11_SP0_build_10238 and DNP3 Process Gateway up to 7.11_SP0_build_10238. Malformed DNP3 messages can cause the gateway or driver to crash, disrupting SCADA communications with field devices.

What this means
What could happen
An attacker could send malformed DNP3 protocol messages to crash the zenon gateway or driver, disrupting communication between the SCADA system and field devices. This could interrupt data collection and control operations.
Who's at risk
Water utilities and electric utilities using COPA-DATA zenon SCADA systems with DNP3 integration for RTU and IED communication. Organizations that rely on DNP3 master/outstation gateways for field device polling should prioritize this.
How it could be exploited
An attacker with network access to the DNP3 communication port (typically 20000 for zenon) sends crafted DNP3 messages with invalid input data. The driver or gateway fails to validate the input properly and crashes, stopping DNP3 communications until manually restarted.
Prerequisites
  • Network access to the zenon DNP3 NG driver or Process Gateway on the standard or configured DNP3 port
  • Ability to send raw DNP3 protocol packets
remotely exploitableno patch availableaffects SCADA gatewayimproper input validation
Exploitability
Low exploit probability (EPSS 0.9%)
Affected products (2)
2 EOL
ProductAffected VersionsFix Status
zenon DNP3 NG driver (DNP3 master): >=7.10_SP0|<=7.11_SP0_build_10238≥ 7.10 SP0|≤ 7.11 SP0 build 10238No fix (EOL)
zenon DNP3 Process Gateway (DNP3 outstation): <=7.11_SP0_build_10238≤ 7.11 SP0 build 10238No fix (EOL)
Remediation & Mitigation
0/3
Do now
0/2
HARDENINGNetwork segmentation: Restrict network access to the zenon gateway and DNP3 driver to only authorized SCADA systems and field devices. Use firewall rules to block unsolicited DNP3 traffic.
HARDENINGMonitoring and alerting: Enable logging and set up alerts for abnormal DNP3 protocol messages or unexpected gateway restarts.
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

WORKAROUNDMonitor vendor release notes for zenon updates and patches when available.
↑↓ Navigate · Esc Close
API: /api/v1/advisories/2e844d11-c3be-4ba8-aa1d-d1ebde4f32d4