In a big discovery, PRODAFT’s safety analysis staff has recognized two vital vulnerabilities within the mySCADA myPRO Supervisor, a broadly used Supervisory Management and Information Acquisition (SCADA) administration resolution.
These vulnerabilities, if exploited, might grant unauthorized entry to industrial management networks, doubtlessly resulting in extreme operational disruptions and monetary losses.
The vulnerabilities are categorized as OS Command Injection, permitting distant attackers to execute arbitrary instructions on affected methods.
The vulnerabilities exist on account of improper enter sanitization within the myPRO Supervisor.
An attacker can inject system instructions and execute arbitrary code by sending specifically crafted POST requests containing e mail or model parameters to a particular port.
The affected merchandise embody myPRO Supervisor variations previous to 1.3 and myPRO Runtime variations previous to 9.2.1.
Each vulnerabilities are rated as vital, with CVSS v4 scores of 9.3, indicating a excessive degree of severity.
Impression and Exploitation
The vulnerabilities are categorized underneath CWE-78, which entails the improper neutralization of particular components utilized in an OS command.
This enables for Distant Command Execution (RCE), enabling attackers to execute arbitrary system instructions.
The impression is critical, because it might result in unauthorized entry to industrial management methods (ICS), doubtlessly disrupting operations throughout vital sectors similar to power and manufacturing.
The exploitation course of entails sending a specifically crafted POST request to a particular port, both utilizing an e mail or model parameter.

In response to Catalyst Report, this lack of enter sanitization permits attackers to inject malicious instructions, which could be executed on the system.
A profitable exploitation can result in a reverse shell, offering attackers with full management over the system.
Threat Mitigation
To mitigate these dangers, organizations ought to apply vendor-issued patches instantly.
Moreover, implementing community segmentation to isolate SCADA methods from IT networks can cut back the assault floor.
Implementing sturdy entry controls, together with multi-factor authentication (MFA), and utilizing Intrusion Detection Techniques (IDS) and Safety Data and Occasion Administration (SIEM) options for real-time risk detection are additionally essential.
The invention of those vulnerabilities highlights the persistent safety dangers in SCADA methods and the necessity for proactive protection methods.
As cyber threats evolve, it’s important for organizations to remain forward of rising threats by investing in sturdy safety measures and steady monitoring.
By addressing these vulnerabilities proactively, organizations can defend vital infrastructure from cyberattacks and guarantee operational resilience.
Are you from SOC/DFIR Groups? – Analyse Malware Incidents & get reside Entry with ANY.RUN -> Begin Now for Free.