Multiple vulnerabilities in third-party components in ST7 ScadaConnect before V1.1
Act Now8.2SSA-341067Jun 11, 2024
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary
Multiple vulnerabilities in third-party components in ST7 ScadaConnect before V1.1. The vulnerabilities include integer overflow (CWE-190), use-after-free (CWE-415), improper certificate validation (CWE-295), improper input validation (CWE-20), null pointer dereference (CWE-476), insufficient encryption (CWE-311), buffer overflow (CWE-119), and uncontrolled resource consumption (CWE-400). These flaws affect the ScadaConnect application's ability to securely process data and validate external connections.
What this means
What could happen
An attacker with network access could crash the ScadaConnect application, disrupt communication with SCADA devices, or potentially execute commands that interfere with energy system operations.
Who's at risk
Energy sector operators running ST7 ScadaConnect for SCADA communications and monitoring. This includes electric utilities and generation facilities that rely on ScadaConnect for real-time monitoring and control of power systems and substations.
How it could be exploited
An attacker on the network could send malicious data packets or establish invalid connections to ST7 ScadaConnect without authentication. Integer overflow, buffer overflow, or null pointer dereference vulnerabilities could cause the application to crash (denial of service) or allow code execution. Improper certificate validation could allow man-in-the-middle attacks to intercept or modify SCADA communications.
Prerequisites
- Network access to ST7 ScadaConnect application port (network-reachable device)
- No authentication required to trigger most vulnerabilities
- Vulnerable version (any version before V1.1)
remotely exploitableno authentication requiredlow complexityactively exploited (KEV)high EPSS score (94.5%)affects energy operations
Exploitability
Actively exploited — confirmed by CISA KEV
Affected products (1)
ProductAffected VersionsFix Status
ST7 ScadaConnect<V1.11.1
Remediation & Mitigation
0/1
Do now
0/1HOTFIXUpdate ST7 ScadaConnect to version 1.1 or later
CVEs (37)
CVE-2022-40303CVE-2022-40304CVE-2023-0464CVE-2023-0465CVE-2023-0466CVE-2023-3446CVE-2023-5678CVE-2023-21808CVE-2023-24895CVE-2023-24897CVE-2023-24936CVE-2023-28260CVE-2023-28484CVE-2023-29331CVE-2023-29469CVE-2023-32032CVE-2023-33126CVE-2023-33127CVE-2023-33128CVE-2023-33135CVE-2023-33170CVE-2023-35390CVE-2023-35391CVE-2023-36038CVE-2023-36049CVE-2023-36435CVE-2023-36558CVE-2023-36792CVE-2023-36793CVE-2023-36794CVE-2023-36796CVE-2023-36799CVE-2023-38171CVE-2023-38178CVE-2023-38180CVE-2023-39615CVE-2023-44487
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/a6c8b99f-d12b-4b4e-8961-012b0b73b808