¹¤¿ØÈí¼þCODESYS web ЧÀÍÆ÷ÑÏÖØÎó²îΣº¦Í¨¸æ
Ðû²¼Ê±¼ä 2020-03-27Îó²î±àºÅºÍ¼¶±ð
CVE±àºÅ£ºCVE-2020-10245£¬£¬£¬Î£ÏÕ¼¶±ð£ºÑÏÖØ£¬£¬£¬CVSS·ÖÖµ£º³§ÉÌ×ÔÆÀ£º10£¬£¬£¬¹Ù·½Î´ÆÀ¶¨
Ó°Ïì°æ±¾
°üÀ¨V3.5.15.40֮ǰ°æ±¾µÄweb ЧÀÍÆ÷(CmpWebServer ºÍ CmpWebServerHandler)µÄCODESYS V3ϵͳ£º
CODESYS Control for BeagleBone
CODESYS Control for emPC-A/iMX6
CODESYS Control for IOT2000
CODESYS Control for Linux
CODESYS Control for PLCnext
CODESYS Control for PFC100
CODESYS Control for PFC200
CODESYS Control for Raspberry Pi
CODESYS Control RTE V3
CODESYS Control RTE V3 (for Beckhoff CX)
CODESYS Control Win V3 (also part of the CODESYS Development System setup)
CODESYS HMI V3
CODESYS Control V3 Runtime System Toolkit
CODESYS V3 Embedded Target Visu Toolkit
CODESYS V3 Remote Target Visu Toolkit
Îó²î¸ÅÊö
CODESYS Èí¼þÌ×¼þ×÷Ϊ±à³Ì¿ØÖÆÆ÷Ó¦ÓóÌÐòµÄ¿ª·¢ÇéÐΣ¬£¬£¬Í¨³£¼ûÓÚ¹¤ÒµÇéÐΡ£¡£¡£ËüÊÇÓɵ¹ú¹«Ë¾ Smart Software Solutions(3S) ¿ª·¢µÄ£¬£¬£¬ÓÃÓÚʹ×Ô¶¯»¯½â¾ö¼Æ»®¹¤³Ì¸üÀû±ã£¬£¬£¬ÊÇ×ÔÁ¦ÓÚÆ½Ì¨µÄ¿ª·¢ÇéÐΣ¬£¬£¬¼æÈݿɱà³ÌÂß¼¿ØÖÆÆ÷ (PLC) Ó²¼þºÍÊý°Ù¼ÒÆóҵʹÓõÄÐí¶àÆäËü×Ô¶¯»¯×é¼þ¡£¡£¡£CODESYS web ЧÀÍÆ÷ÓÃÓÚÔÚ web ä¯ÀÀÆ÷ÖÐչʾ CODESYS ϵͳ¿ÉÊÓ»¯ÆÁÄ»¡£¡£¡£
CODESYS web ЧÀÍÆ÷Öб£´æÒ»¸öÑÏÖØÎó²î£¬£¬£¬¿Éµ¼Ö web ЧÀÍÆ÷Í߽⣬£¬£¬Òý·¢¾Ü¾øÐ§ÀÍ»ò¿É±»ÓÃÓÚÔ¶³ÌÖ´ÐдúÂë¡£¡£¡£
¸ÃÎó²îµÄÎÊÌâÔÚÓÚ£¬£¬£¬web ЧÀÍÆ÷¿â CmpWebServerHandlerV3.dllδ׼ȷÑéÖ¤·¢ËÍÖÁ web ЧÀÍÆ÷ URL ¶ËµãµÄÓû§ÊäÈëÊý¾ÝµÄÓÐÓÃÐÔ¡£¡£¡£
Îó²îÑéÖ¤
GitHub ÉÏÐû²¼µÄ PoC ÏÔʾ£¬£¬£¬¿ÉʹÓÃÒ»¸ö exploit ÖÕÖ¹ web ЧÀÍÆ÷ÖеÄ32λ ¡°CODESYSControlService.exe¡±Àú³Ì£ºhttps://github.com/tenable/poc/blob/master/codesys/codesys_v3_webserver_int32_overflow_tra_2020_16.py¡£¡£¡£
ÐÞ¸´½¨Òé
ÏÖÔÚ³§ÉÌÒÑÐû²¼V3.5.15.40£¬£¬£¬Á´½Ó£ºhttps://customers.codesys.com/index.php?eID=dumpFile&t=f&f=13078&token=de344ca65252463cc581ef144e0c53bd97b8f211&download=¡£¡£¡£
²Î¿¼Á´½Ó
https://threatpost.com/critical-codesys-bug-remote-code-execution/154213/