Rockwell Automation | ¶à¸öÇå¾²Îó²îͨ¸æ

Ðû²¼Ê±¼ä 2020-05-27

0x00 Îó²î¸ÅÊö



²úÆ·

CVE ID

Àà ÐÍ

Îó²îÆ·¼¶

Ô¶³ÌʹÓÃ

Ó°Ïì¹æÄ£

Rockwell Automation EDS Subsystem

CVE-2020-12034

SI

¸ßΣ

ÊÇ

FactoryTalk Linx software:6.00,6.10,6.11

RSLinx Classic <= 4.11.00

RSNetWorx software <= 28.00.00

Studio 5000 Logix Designer software <= 32

CVE-2020-12038

B0

ÖÐΣ

·ñ


0x01 Îó²îÏêÇé


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾



ÂÞ¿ËΤ¶û×Ô¶¯»¯ÓÐÏÞ¹«Ë¾ÊÇÈ«Çò×î´óµÄÖÂÁ¦ÓÚ¹¤Òµ×Ô¶¯»¯ÓëÐÅÏ¢µÄ¹«Ë¾Ö®Ò»£¬£¬£¬ £¬ÖÂÁ¦ÓÚ×ÊÖú¿Í»§Ìá¸ßÉú²úÁ¦£¬£¬£¬ £¬ÒÔ¼°ÌìÏ¿ÉÒ»Á¬Éú³¤¡£¡£¡£¡£

¿ËÈÕ£¬£¬£¬ £¬¹¤ÒµÍøÂçÇå¾²¹«Ë¾ClarotyµÄÑо¿Ö°Ô±·¢Ã÷ÁËÂÞ¿ËΤ¶û²úƷʹÓõĵç×ÓÊý¾Ý±í£¨EDS£©×ÓϵͳÖеÄÁ½¸öÇå¾²Îó²î£¬£¬£¬ £¬Îó²îÓëEDS×ÓϵͳÆÊÎöEDSÎļþÄÚÈݵķ½·¨ÓйØ¡£¡£¡£¡£EDSÎļþ°üÀ¨×°±¸µÄÉèÖÃÊý¾Ý£¬£¬£¬ £¬ÍøÂçÖÎÀí¹¤¾ß½«ÆäÓÃÓÚ±êʶºÍµ÷ÊÔ¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔ½¨ÉèÒ»¸ö¶ñÒâµÄEDSÎļþ£¬£¬£¬ £¬ÒÔ±ãÔÚ±»ÂÞ¿ËΤ¶ûµÄÈí¼þÆÊÎöºó£¬£¬£¬ £¬½«WindowsÅú´¦Öóͷ£ÎļþдÈëí§Òâ·¾¶£¬£¬£¬ £¬°üÀ¨Æô¶¯Ä¿Â¼£¬£¬£¬ £¬Õâ¿ÉÒÔµ¼ÖÂÖØÐÂÆô¶¯ºóÖ´ÐдúÂë¡£¡£¡£¡£

CVE-2020-12034ÊÇRockwell Automation EDS Subsystem SQL×¢ÈëÎó²î¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚEDS×ÓϵͳûÓжÔÓû§ÊäÈë¾ÙÐгä·ÖµÄÑéÖ¤£¬£¬£¬ £¬Ê¹¹¥»÷Õß¿ÉÒÔ½¨Éè¶ñÒâµÄEDSÎļþ¾ÙÐÐSQL×¢È룬£¬£¬ £¬µ¼Ö¾ܾøÐ§ÀÍ¡£¡£¡£¡£

CVE-2020-12038ÊÇRockwell Automation EDS Subsystem »º³åÇøÒç³öÎó²î¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔ½¨Éè¶ñÒâµÄEDSÎļþʹEDSParser COM¹¤¾ßÍ߽⣬£¬£¬ £¬´Ó¶øµ¼Ö¾ܾøÐ§ÀÍ¡£¡£¡£¡£


0x02 ´¦Öóͷ£½¨Òé


ÏÖÔÚ³§ÉÌÒÑÐû²¼Éý¼¶²¹¶¡ÒÔÐÞ¸´Îó²î£¬£¬£¬ £¬²Î¿¼Á´½Ó£º

https://www.rockwellautomation.com/

https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1125928£¨ÐèҪע²á£©

ǶÈëʽ²úÆ·µÄÎó²î»º½â²½·¥£º

? ÔÚ·À»ðǽ/UTM×°±¸ÉϼàÊÓ»òÏÞÖÆTCP 2222¡¢7153¶Ë¿ÚºÍUDP 44818¶Ë¿Ú¡£¡£¡£¡£

Ò»Ñùƽ³£»º½â²½·¥£º

? ¶¨Î»·À»ðǽ·À»¤µÄ¿ØÖÆÏµÍ³ÍøÂçºÍÔ¶³Ì×°±¸£¬£¬£¬ £¬²¢½«ÆäÓëÓªÒµÍøÂç¸ôÀ룻£» £» £»£»£»£»

? Ô¶³Ì»á¼ûʱ£¬£¬£¬ £¬½¨ÒéʹÓÃÐéÄâרÓÃÍøÂ磨VPN£©£¬£¬£¬ £¬²¢È·ÈÏVPN¿ÉÄܱ£´æµÄÎó²î£¬£¬£¬ £¬Ð轫VPN¸üе½×îа汾¡£¡£¡£¡£


0x03 Ïà¹ØÐÂÎÅ


https://www.securityweek.com/hackers-can-target-rockwell-industrial-software-malicious-eds-files


0x04 ²Î¿¼Á´½Ó


https://www.us-cert.gov/ics/advisories/icsa-20-140-01


0x05 ʱ¼äÏß


2020-05-27 VSRCÐû²¼Îó²îͨ¸æ


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾