New ScadaBR Vulnerability Added to Exploited Vulnerability Catalog

Published:

spot_img

New Vulnerability Identified in ScadaBR by CISA

Overview of the Vulnerability

The U.S. Cybersecurity and Infrastructure Agency (CISA) has recently added a significant vulnerability, CVE-2021-26828, to its catalog of known exploited vulnerabilities. This new entry highlights a security flaw present in OpenPLC’s ScadaBR version 0.9.1 for Linux and version 1.12.4 for Windows. The vulnerability allows authenticated remote users to upload arbitrary code via .jsp files, potentially leading to unauthorized remote code execution.

Severity and Implications

CVE-2021-26828 has been assessed with a Common Vulnerability Scoring System (CVSS) score of 8.7, categorizing it as a high-severity issue. This rating indicates a significant risk, emphasizing that organizations utilizing ScadaBR should take immediate action to mitigate potential threats associated with this vulnerability.

Historical Context

This vulnerability was initially revealed in June 2021, alongside another vulnerability labeled CVE-2021-26829. Just this week, CISA included CVE-2021-26829 in its Known Exploited Vulnerabilities (KEV) catalog, bringing renewed attention to these related security weaknesses.

Targeted Exploits by Hacktivist Groups

Cybersecurity firm Forescout has recently issued a report detailing the exploitation of both CVE-2021-26828 and CVE-2021-26829 by the Russian hacktivist group, TwoNet. Their observations indicate that the group targeted an environment set up to mimic a water treatment facility—a critical infrastructure component, making it a prime target for cyber-attackers.

Forescout identified two IP addresses linked to Russian entities actively exploiting this vulnerability. Both were traced back to a Moldovan hosting provider that is associated with Stark Industries Solutions, known for its involvement in numerous cyber threats, including distributed denial-of-service (DDoS) attacks and malware linked to Russia-supported hacking efforts.

Investigation Findings

According to Forescout, the activity from these IP addresses was well-coordinated. The evidence suggests a methodical approach, with initial access followed by the deployment of a web shell, leading to further manipulation at the Human Machine Interface (HMI) level. The researchers stated, “We assess with moderate confidence that the actions from these two IPs were coordinated, evidenced by tight sequencing and complementary roles.”

Understanding the Exploitation Path

The exploitation pathway begins with default credentials, leading to CVE-2021-26828 and subsequently facilitating the placement of a web shell. This sequence allows operators with relatively low-to-moderate capabilities to exploit the vulnerability using publicly available tools, which heightens the urgency for organizations relying on ScadaBR to review their security measures.

Conclusion

As cybersecurity threats continue to evolve, the identification of vulnerabilities like CVE-2021-26828 shows the critical need for organizations to stay informed and proactive. The ongoing monitoring and patching of these vulnerabilities can significantly reduce the risk of potential attacks on vital infrastructure components.

For organizations that utilize ScadaBR, assessing and mitigating the risks associated with CVE-2021-26828 should be prioritized to protect their systems effectively against increasing cyber threats.

spot_img

Related articles

Recent articles

$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Scheme

$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Scheme In a significant cybersecurity breach, Drift has disclosed that the attack on April 1,...

Mastermind Arrested as Delhi Police Uncover ₹300 Crore International Cyber Fraud Network

Mastermind Arrested as Delhi Police Uncover ₹300 Crore International Cyber Fraud Network A routine investigation into a single financial fraud complaint in New Delhi has...

UAE Warns: AI-Driven Phishing Scams Account for 90% of Cyber Breaches

UAE Warns: AI-Driven Phishing Scams Account for 90% of Cyber Breaches In a recent statement, the Cybersecurity Council of the UAE highlighted a troubling trend...

36 Malicious npm Packages Exploit Redis and PostgreSQL to Deploy Persistent Implants

36 Malicious npm Packages Exploit Redis and PostgreSQL to Deploy Persistent Implants Recent cybersecurity investigations have unveiled a significant threat within the npm registry, where...