¡¾·ì϶¹«¸æ¡¿OPCºÍ̸¶à¸ö°²È«·ì϶

°ä²¼¹¦·ò 2021-01-26

0x00 ·ì϶¸ÅÊö

Ê¢¿ªÆ½Ì¨Í¨Ñ¶£¨OPC£©ÍøÂçºÍ̸ÊDzÙ×÷¼¼Êõ£¨OT£©ÍøÂçµÄÖÐÑëÈË £¬È·±£¹¤Òµ½ÚÔìϵͳ£¨ICS£©ºÍרÓÐÉ豸֮¼äµÄ¿É²Ù×÷ÐÔ £¬ÈçÕÆ¹ÜÏÖ³¡É豸ÕýÈ·²Ù×÷µÄ¿É±à³ÌÂß¼­½ÚÔìÆ÷(PLC)¡£OPCѡȡ³ß¶È»¯µÄͨѶºÍ̸¼°Æä¹æ·¶£¨OPC DA¡¢AE¡¢HDA¡¢XML DA¡¢DXºÍOPC UA£© £¬±£ÕÏÁ˶ÔÉ豸ºÍ¹ý³ÌµÄÖÎÀíºÍ¼à¶½Äܹ»´ÓÒ»¸ö¼¯ÖеķþÎñÆ÷ÉϽøÐÐ £¬Æäͨ³£×÷ΪһÖÖÔÚICSÓòÖеÄÉ豸ÖÐÔËÐеÄǶÈëʽºÍ̸¶ø±»¿í·ºÊ¹Óá£

2021Äê01ÔÂ25ÈÕ £¬Claroty×êÑÐÓ××éÅû¶ÁËMatrikon Honeywell ¡¢ Softing Industrial Automation GmbH ºÍPTC KepwareµÄOPCÖдæÔڵĶà¸ö°²È«·ì϶¡£

 

0x01 ·ì϶ÏêÇé

image.png

 

±»Åû¶µÄOPC·ì϶ÈçÏ£º

²úÆ·

CVE ID

Àà ÐÍ

·ì϶µÈ¼¶

Ó°Ïì

£¨Softing Industrial Automation GmbH£©

OPC

CVE-2020-14524

»ùÓڶѵĻº³åÇøÒç³ö

ÑϳÁ

·þÎñ±ÀÀ£¡¢´úÂëÖ´ÐÐ

CVE-2020-14522

×ÊÔ´¿÷Ëð

¸ßΣ

»Ø¾ø·þÎñ

£¨Honeywell£©

OPC UA Tunneller

CVE-2020-27297

»ùÓڶѵĻº³åÇøÒç³ö

ÑϳÁ

RCE

CVE-2020-27299

Ô½½ç¶ÁÈ¡

¸ßΣ

ÐÅϢй¶¡¢É豸±ÀÀ£

CVE-2020-27274

²é³­²»µ±

¸ßΣ

»Ø¾ø·þÎñ

CVE-2020-27295

×ÊÔ´¿÷Ëð

¸ßΣ

»Ø¾ø·þÎñ

£¨PTC£©

Kepware KEPServerEX

CVE-2020-27265

»ùÓڶѵĻº³åÇøÒç³ö

ÑϳÁ

·þÎñ±ÀÀ£¡¢RCE

CVE-2020-27263

»ùÓڶѵĻº³åÇøÒç³ö

ÑϳÁ

·þÎñ±ÀÀ£¡¢Êý¾Ýй¶

CVE-2020-27267

Use-after-free

¸ßΣ

·þÎñ±ÀÀ£

 

Softing OPC»ùÓڶѵĻº³åÇøÒç¶Âí½Å£¨CVE-2020-14524£©

Softing OPC DA XML¿âÖдæÔÚ»ùÓڶѵĻº³åÇøÒç¶Âí½Å £¬ÆäCVSSÆÀ·Ö9.8¡£¹¥»÷ÕßÄܹ»Í¨¹ýÀûÓô˷ì϶Ôì³É·þÎñ±ÀÀ£»òÔ¶³ÌÖ´ÐÐËÁÒâ´úÂë¡£

Softing Web·þÎñÆ÷ûÓÐÏÞ¶ÈSOAP±êÍ·µÄ³¤¶È £¬Ò²Ã»Óо»»¯SOAP±êÍ·µÄÖµ £¬ÓÉÓÚËüͨ¹ýSOAP½âÎöΪOPC DA XML¡£

Òì³£³¤µÄ±êÍ·½«µ¼Ö·þÎñÆ÷ÎÞÐÝÖ¹µØ·ÖÅäÄÚ´æ £¬ÄÚ´æ·ÖÅä×îÖÕ»áÓÉÓÚ¶ÑÄÚ´æµÄ×ÊÔ´¿÷Ëð¶øÊ§°Ü¡£µ«ÊÇWeb·þÎñÆ÷²»»á²é³­ÄÚ´æ·ÖÅäµÄ·µ»ØÂë £¬¶øÊdz¢ÊÔ½«Êý¾Ý¸´Ôìµ½·µ»ØµÄÖ¸Õë¡£µ«ÊÇÓÉÓÚ·µ»ØµÄÖ¸ÕëΪNULL £¬¹¥»÷ÕßµÄÊý¾Ý½«±»¸´Ô쵽δ³õʼ»¯µÄÄÚ´æÖÐ £¬×îÖÕµ¼Ö½ӼûÒì³£²¢Ê¹·þÎñ±ÀÀ£¡£

Ó°ÏìÁìÓò£¨ËùÓзì϶£©

Softing Industrial Automation GmbH OPC < 4.47.0

 

Honeywell OPC UA Tunneller»ùÓڶѵĻº³åÇøÒç¶Âí½Å£¨CVE-2020-27297£©

ÔÚHoneywell OPC Tunneller×é¼þÖз¢ÏÖÁ˶à¸ö°²È«·ì϶ £¬ÆäÖÐÔ̺¬Ò»¸öÑϳÁµÄ¶ÑÒç¶Âí½Å£¨CVE-2020-27297£© £¬ÆäCVSSÆÀ·Ö9.8¡£³É¹¦ÀûÓô˷ì϶µÄ¹¥»÷ÕßÄܹ»°Ñ³ÖÄÚ´æ²¢Ô¶³ÌÖ´ÐдúÂë¡£

Ó°ÏìÁìÓò£¨ËùÓзì϶£©

OPC UA Tunneller < 6.3.0.8233

 

 

PTC Kepware KEPServerEX»ùÓڶѵĻº³åÇøÒç¶Âí½Å£¨CVE-2020-27265£©

¸Ã·ì϶ÊÇKEPServerEXÖеÄÒ»¸ö»º³åÇøÒç¶Âí½Å £¬ÆäCVSSÆÀ·Ö9.8¡£¹¥»÷Õß¿Éͨ¹ý·¢ËͶñÒâµÄOPC UAÐÂÎÅÀ´ÀûÓô˷ì϶ £¬×îÖÕµ¼Ö·þÎñ±ÀÀ£»òÔ¶³ÌÖ´ÐдúÂë¡£

Ó°ÏìÁìÓò£¨ËùÓзì϶£©

KEPServerEX: v6.0-v6.9

ThingWorx Kepware Server: v6.8¡¢v6.9

ThingWorx Industrial Connectivity: ËùÓа汾

OPC-Aggregator: ËùÓа汾

×é¼þ£º

Rockwell Automation KEPServer Enterprise: v6.6.504.0 ¡¢ v6.9.572.0

GE Digital Industrial Gateway Server: v7.68.804 ¡¢ v7.66

Software Toolbox TOP Server: ËùÓÐ 6.x °æ±¾

 

 

0x02 ´ëÖý¨Òé

Ŀǰ £¬Óйطì϶Òѱ»½¨¸´ £¬½¨Òé²Î¿¼²¼¸æÊµÊ±Éý¼¶¡£

Softing Industrial Automation OPC

https://us-cert.cisa.gov/ics/advisories/icsa-20-210-02

 

Honeywell OPC UA Tunneller

https://us-cert.cisa.gov/ics/advisories/icsa-21-021-03

 

PTC Kepware KEPServerEX

https://us-cert.cisa.gov/ics/advisories/icsa-20-352-02

 

 

0x03 ²Î¿¼Á´½Ó

https://www.claroty.com/2021/01/25/blog-research-critical-flaws-in-opc-protocol/

https://www.darkreading.com/attacks-breaches/claroty-discloses-multiple-critical-vulns-in-vendor-implementations-of-key-ot-protocol/d/d-id/1339973

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27265

 

 

0x04 ¹¦·òÏß

2021-01-25  CLAROTYÅû¶·ì϶

2021-01-26  VSRC°ä²¼°²È«¹«¸æ

 

0x05 ¸½Â¼

 

CVSSÆÀ·Ö³ß¶È¹ÙÍø£ºhttp://www.first.org/cvss/

image.png