¹¤¿ØÈí¼þCODESYS web ЧÀÍÆ÷ÑÏÖØÎó²îΣº¦Í¨¸æ

Ðû²¼Ê±¼ä 2020-03-27

Îó²î±àºÅºÍ¼¶±ð


CVE±àºÅ£ºCVE-2020-10245£¬£¬£¬Î£ÏÕ¼¶±ð£ºÑÏÖØ£¬£¬£¬CVSS·ÖÖµ£º³§ÉÌ×ÔÆÀ£º10£¬£¬£¬¹Ù·½Î´ÆÀ¶¨


Ó°Ïì°æ±¾


°üÀ¨V3.5.15.40֮ǰ°æ±¾µÄweb ЧÀÍÆ÷(CmpWebServer ºÍ CmpWebServerHandler)µÄCODESYS V3ϵͳ£º

CODESYS Control for BeagleBone

CODESYS Control for emPC-A/iMX6

CODESYS Control for IOT2000

CODESYS Control for Linux

CODESYS Control for PLCnext

CODESYS Control for PFC100

CODESYS Control for PFC200

CODESYS Control for Raspberry Pi

CODESYS Control RTE V3

CODESYS Control RTE V3 (for Beckhoff CX)

CODESYS Control Win V3 (also part of the CODESYS Development System setup)

CODESYS HMI V3

CODESYS Control V3 Runtime System Toolkit

CODESYS V3 Embedded Target Visu Toolkit

CODESYS V3 Remote Target Visu Toolkit


Îó²î¸ÅÊö


CODESYS Èí¼þÌ×¼þ×÷Ϊ±à³Ì¿ØÖÆÆ÷Ó¦ÓóÌÐòµÄ¿ª·¢ÇéÐΣ¬£¬£¬Í¨³£¼ûÓÚ¹¤ÒµÇéÐΡ£¡£ ¡£ËüÊÇÓɵ¹ú¹«Ë¾ Smart Software Solutions(3S) ¿ª·¢µÄ£¬£¬£¬ÓÃÓÚʹ×Ô¶¯»¯½â¾ö¼Æ»®¹¤³Ì¸üÀû±ã£¬£¬£¬ÊÇ×ÔÁ¦ÓÚÆ½Ì¨µÄ¿ª·¢ÇéÐΣ¬£¬£¬¼æÈݿɱà³ÌÂß¼­¿ØÖÆÆ÷ (PLC) Ó²¼þºÍÊý°Ù¼ÒÆóҵʹÓõÄÐí¶àÆäËü×Ô¶¯»¯×é¼þ¡£¡£ ¡£CODESYS web ЧÀÍÆ÷ÓÃÓÚÔÚ web ä¯ÀÀÆ÷ÖÐչʾ CODESYS ϵͳ¿ÉÊÓ»¯ÆÁÄ»¡£¡£ ¡£

CODESYS web ЧÀÍÆ÷Öб£´æÒ»¸öÑÏÖØÎó²î£¬£¬£¬¿Éµ¼Ö web ЧÀÍÆ÷Í߽⣬£¬£¬Òý·¢¾Ü¾øÐ§ÀÍ»ò¿É±»ÓÃÓÚÔ¶³ÌÖ´ÐдúÂë¡£¡£ ¡£


¸ÃÎó²îµÄÎÊÌâÔÚÓÚ£¬£¬£¬web ЧÀÍÆ÷¿â CmpWebServerHandlerV3.dllδ׼ȷÑéÖ¤·¢ËÍÖÁ web ЧÀÍÆ÷ URL ¶ËµãµÄÓû§ÊäÈëÊý¾ÝµÄÓÐÓÃÐÔ¡£¡£ ¡£


Îó²îÑéÖ¤


GitHub ÉÏÐû²¼µÄ PoC ÏÔʾ£¬£¬£¬¿ÉʹÓÃÒ»¸ö exploit ÖÕÖ¹ web ЧÀÍÆ÷ÖеÄ32λ ¡°CODESYSControlService.exe¡±Àú³Ì£ºhttps://github.com/tenable/poc/blob/master/codesys/codesys_v3_webserver_int32_overflow_tra_2020_16.py¡£¡£ ¡£


ÐÞ¸´½¨Òé


ÏÖÔÚ³§ÉÌÒÑÐû²¼V3.5.15.40£¬£¬£¬Á´½Ó£ºhttps://customers.codesys.com/index.php?eID=dumpFile&t=f&f=13078&token=de344ca65252463cc581ef144e0c53bd97b8f211&download=¡£¡£ ¡£


²Î¿¼Á´½Ó


https://threatpost.com/critical-codesys-bug-remote-code-execution/154213/