vendor:
SEIG SCADA SYSTEM 9
by:
Alejandro Parodi
7.5
CVSS
HIGH
Remote Code Execution
119
CWE
Product Name: SEIG SCADA SYSTEM 9
Affected Version From: v9
Affected Version To: v9
Patch Exists: NO
Related CWE: CVE-2013-0657
CPE: a:schneider-electric:seig_scada_system:9
Platforms Tested: Windows 7 x86
2018
SEIG SCADA SYSTEM 9 – Remote Code Execution
This exploit allows an attacker to execute remote code on the SEIG SCADA SYSTEM 9. The vulnerability was found by Alejandro Parodi and has a CVE ID of CVE-2013-0657. The exploit takes advantage of a buffer overflow in the software to execute arbitrary code. The vulnerability exists in version 9 of the software and has been tested on Windows 7 x86. The exploit involves sending a specially crafted payload to the target system. The payload includes a header, protocol data, padding, and a return address. A shellcode is also included in the payload, which is responsible for executing the desired code. The exploit has been successfully tested on the specified platform and version.
Mitigation:
To mitigate this vulnerability, it is recommended to update the SEIG SCADA SYSTEM 9 software to a version that includes a patch for CVE-2013-0657. Additionally, it is advisable to implement security measures such as network segmentation and access controls to limit the impact of a potential exploit.