¡¾·ì϶¹«¸æ¡¿OPCºÍ̸¶à¸ö°²È«·ì϶
°ä²¼¹¦·ò 2021-01-260x00 ·ì϶¸ÅÊö
Ê¢¿ªÆ½Ì¨Í¨Ñ¶£¨OPC£©ÍøÂçºÍ̸ÊDzÙ×÷¼¼Êõ£¨OT£©ÍøÂçµÄÖÐÑëÈË£¬È·±£¹¤Òµ½ÚÔìϵͳ£¨ICS£©ºÍרÓÐÉ豸֮¼äµÄ¿É²Ù×÷ÐÔ£¬ÈçÕÆ¹ÜÏÖ³¡É豸ÕýÈ·²Ù×÷µÄ¿É±à³ÌÂß¼½ÚÔìÆ÷(PLC)¡£OPCѡȡ³ß¶È»¯µÄͨѶºÍ̸¼°Æä¹æ·¶£¨OPC DA¡¢AE¡¢HDA¡¢XML DA¡¢DXºÍOPC UA£©£¬±£ÕÏÁ˶ÔÉ豸ºÍ¹ý³ÌµÄÖÎÀíºÍ¼à¶½Äܹ»´ÓÒ»¸ö¼¯ÖеķþÎñÆ÷ÉϽøÐУ¬Æäͨ³£×÷ΪһÖÖÔÚICSÓòÖеÄÉ豸ÖÐÔËÐеÄǶÈëʽºÍ̸¶ø±»¿í·ºÊ¹Óá£
2021Äê01ÔÂ25ÈÕ£¬Claroty×êÑÐÓ××éÅû¶ÁËMatrikon Honeywell ¡¢ Softing Industrial Automation GmbH ºÍPTC KepwareµÄOPCÖдæÔڵĶà¸ö°²È«·ì϶¡£
0x01 ·ì϶ÏêÇé

±»Åû¶µÄOPC·ì϶ÈçÏ£º
²úÆ· | CVE ID | Àà ÐÍ | ·ì϶µÈ¼¶ | Ó°Ïì |
£¨Softing Industrial Automation GmbH£© OPC | CVE-2020-14524 | »ùÓڶѵĻº³åÇøÒç³ö | ÑϳÁ | ·þÎñ±ÀÀ£¡¢´úÂëÖ´ÐÐ |
CVE-2020-14522 | ×ÊÔ´¿÷Ëð | ¸ßΣ | »Ø¾ø·þÎñ | |
£¨Honeywell£© OPC UA Tunneller | CVE-2020-27297 | »ùÓڶѵĻº³åÇøÒç³ö | ÑϳÁ | RCE |
CVE-2020-27299 | Ô½½ç¶ÁÈ¡ | ¸ßΣ | ÐÅϢй¶¡¢É豸±ÀÀ£ | |
CVE-2020-27274 | ²é³²»µ± | ¸ßΣ | »Ø¾ø·þÎñ | |
CVE-2020-27295 | ×ÊÔ´¿÷Ëð | ¸ßΣ | »Ø¾ø·þÎñ | |
£¨PTC£© Kepware KEPServerEX | CVE-2020-27265 | »ùÓڶѵĻº³åÇøÒç³ö | ÑϳÁ | ·þÎñ±ÀÀ£¡¢RCE |
CVE-2020-27263 | »ùÓڶѵĻº³åÇøÒç³ö | ÑϳÁ | ·þÎñ±ÀÀ£¡¢Êý¾Ýй¶ | |
CVE-2020-27267 | Use-after-free | ¸ßΣ | ·þÎñ±ÀÀ£ |
Softing OPC»ùÓڶѵĻº³åÇøÒç¶Âí½Å£¨CVE-2020-14524£©
Softing OPC DA XML¿âÖдæÔÚ»ùÓڶѵĻº³åÇøÒç¶Âí½Å£¬ÆäCVSSÆÀ·Ö9.8¡£¹¥»÷ÕßÄܹ»Í¨¹ýÀûÓô˷ì϶Ôì³É·þÎñ±ÀÀ£»òÔ¶³ÌÖ´ÐÐËÁÒâ´úÂë¡£
Softing Web·þÎñÆ÷ûÓÐÏÞ¶ÈSOAP±êÍ·µÄ³¤¶È£¬Ò²Ã»Óо»»¯SOAP±êÍ·µÄÖµ£¬ÓÉÓÚËüͨ¹ýSOAP½âÎöΪOPC DA XML¡£
Òì³£³¤µÄ±êÍ·½«µ¼Ö·þÎñÆ÷ÎÞÐÝÖ¹µØ·ÖÅäÄڴ棬ÄÚ´æ·ÖÅä×îÖÕ»áÓÉÓÚ¶ÑÄÚ´æµÄ×ÊÔ´¿÷Ëð¶øÊ§°Ü¡£µ«ÊÇWeb·þÎñÆ÷²»»á²é³ÄÚ´æ·ÖÅäµÄ·µ»ØÂ룬¶øÊdz¢ÊÔ½«Êý¾Ý¸´Ôìµ½·µ»ØµÄÖ¸Õë¡£µ«ÊÇÓÉÓÚ·µ»ØµÄÖ¸ÕëΪNULL£¬¹¥»÷ÕßµÄÊý¾Ý½«±»¸´Ô쵽δ³õʼ»¯µÄÄÚ´æÖУ¬×îÖÕµ¼Ö½ӼûÒì³£²¢Ê¹·þÎñ±ÀÀ£¡£
Ó°ÏìÁìÓò£¨ËùÓзì϶£©
Softing Industrial Automation GmbH OPC < 4.47.0
Honeywell OPC UA Tunneller»ùÓڶѵĻº³åÇøÒç¶Âí½Å£¨CVE-2020-27297£©
ÔÚHoneywell OPC Tunneller×é¼þÖз¢ÏÖÁ˶à¸ö°²È«·ì϶£¬ÆäÖÐÔ̺¬Ò»¸öÑϳÁµÄ¶ÑÒç¶Âí½Å£¨CVE-2020-27297£©£¬ÆäCVSSÆÀ·Ö9.8¡£³É¹¦ÀûÓô˷ì϶µÄ¹¥»÷ÕßÄܹ»°Ñ³ÖÄÚ´æ²¢Ô¶³ÌÖ´ÐдúÂë¡£
Ó°ÏìÁìÓò£¨ËùÓзì϶£©
OPC UA Tunneller < 6.3.0.8233
PTC Kepware KEPServerEX»ùÓڶѵĻº³åÇøÒç¶Âí½Å£¨CVE-2020-27265£©
¸Ã·ì϶ÊÇKEPServerEXÖеÄÒ»¸ö»º³åÇøÒç¶Âí½Å£¬ÆäCVSSÆÀ·Ö9.8¡£¹¥»÷Õß¿Éͨ¹ý·¢ËͶñÒâµÄOPC UAÐÂÎÅÀ´ÀûÓô˷ì϶£¬×îÖÕµ¼Ö·þÎñ±ÀÀ£»òÔ¶³ÌÖ´ÐдúÂë¡£
Ó°ÏìÁìÓò£¨ËùÓзì϶£©
KEPServerEX: v6.0-v6.9
ThingWorx Kepware Server: v6.8¡¢v6.9
ThingWorx Industrial Connectivity: ËùÓа汾
OPC-Aggregator: ËùÓа汾
×é¼þ£º
Rockwell Automation KEPServer Enterprise: v6.6.504.0 ¡¢ v6.9.572.0
GE Digital Industrial Gateway Server: v7.68.804 ¡¢ v7.66
Software Toolbox TOP Server: ËùÓÐ 6.x °æ±¾
0x02 ´ëÖý¨Òé
Ŀǰ£¬Óйطì϶Òѱ»½¨¸´£¬½¨Òé²Î¿¼²¼¸æÊµÊ±Éý¼¶¡£
Softing Industrial Automation OPC
https://us-cert.cisa.gov/ics/advisories/icsa-20-210-02
Honeywell OPC UA Tunneller
https://us-cert.cisa.gov/ics/advisories/icsa-21-021-03
PTC Kepware KEPServerEX
https://us-cert.cisa.gov/ics/advisories/icsa-20-352-02
0x03 ²Î¿¼Á´½Ó
https://www.claroty.com/2021/01/25/blog-research-critical-flaws-in-opc-protocol/
https://www.darkreading.com/attacks-breaches/claroty-discloses-multiple-critical-vulns-in-vendor-implementations-of-key-ot-protocol/d/d-id/1339973
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27265
0x04 ¹¦·òÏß
2021-01-25 CLAROTYÅû¶·ì϶
2021-01-26 VSRC°ä²¼°²È«¹«¸æ
0x05 ¸½Â¼
CVSSÆÀ·Ö³ß¶È¹ÙÍø£ºhttp://www.first.org/cvss/



¾©¹«Íø°²±¸11010802024551ºÅ