Saia Burgess Controls PCD Controllers
Monitor5.3ICS-CERT ICSA-17-234-05Sep 21, 2017
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary
Saia Burgess Controls PCD controllers contain an information disclosure vulnerability that allows an unauthenticated attacker to retrieve sensitive data from the device. The vulnerability affects firmware versions prior to 1.28.16 and 1.24.69. An attacker with network connectivity to the PCD can exploit this remotely without valid credentials or special skills. The vulnerability is classified as CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor).
What this means
What could happen
An unauthenticated attacker with network access to a Saia Burgess PCD controller could retrieve sensitive information from the device, potentially including configuration details or process parameters needed to target other systems in your facility.
Who's at risk
Water authorities, utilities, and other critical infrastructure operators using Saia Burgess PCD controllers for process automation and control. These controllers are commonly used in HVAC systems, building automation, water treatment, and similar supervisory control applications. Any facility relying on PCD devices for operational data logging or setpoint management should be concerned.
How it could be exploited
An attacker on your network (or with routable network access to your PCD) sends requests to the device without authentication to extract data. The vulnerability requires no special credentials or user interaction—the attacker can exploit it directly by communicating with the controller over the network.
Prerequisites
- Network access to the PCD controller over TCP/IP
- No authentication required to trigger the information disclosure
remotely exploitableno authentication requiredlow complexityinformation disclosureno patch available
Exploitability
Low exploit probability (EPSS 0.2%)
Affected products (1)
ProductAffected VersionsFix Status
PCD: firmware< 1.28.16 | < 1.24.69No fix (EOL)
Remediation & Mitigation
0/3
Do now
0/1WORKAROUNDImplement network access controls to allow only trusted engineering workstations to communicate with PCD devices; block untrusted network segments and internet access
Mitigations - no patch available
0/2PCD: firmware has reached End of Life. The vendor will not release a patch. Apply the following compensating controls:
HARDENINGSegment PCD controllers on a separate industrial network with firewall rules that restrict inbound access to engineering workstations and authorized control systems only
HARDENINGMonitor network traffic to and from PCD controllers for unauthorized access attempts or unusual data queries
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/9df3e2d9-b3e7-4509-8200-b76e4a35067d