Bugtraq mailing list archives

Re: CVE-2015-3938 Remote Permanent LoV (Loss of View) in Mitsubishi Melsec FX3G-24M PLC


From: Ralf Spenneberg <ralf () os-t de>
Date: Tue, 29 Sep 2015 18:47:36 +0200

The ICS-CERT will shortly publish an advisory on its own: ICSA-15-146-01
It  has calculated the CVSS-Score to be 7.1 (AV:N/AC:M/Au:N/C:N/I:N/A:C)

We have updated the CVSS Score in our advisory on 
http://www.os-s.net/advisories/mitsubishi_fx3ge_parameter_error-engl.pdf

Ralf Spenneberg

Am Dienstag, 29. September 2015, 12:30:35 schrieb Ralf Spenneberg:
OS-S Security Advisory 2015-03

Date:     September 29th, 2015
CVE:      CVE-2015-3938
CVSS:     5 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

Title:    Mitsubishi ICS FX3G-24M Permanent Communication Denial of Service

Severity: Critical.
          The TCP/IP communication of the Mitsubishi Melsec FX3G-24 is
          permanently disrupted.

Ease of Exploitation: Trivial

Vulnerability type: Wrong input validation (buffer overflow?)

Products: Mitsubishi Melsec FX3G-24M

Abstract
The Mitsubishi Melsec FX3G-24M is a highly integrated Industrial Control
System (ICS). Many functions of the ICS may be controlled via the built-in
HTTP-Server. By using specially crafted HTTP-messages all Ethernet based
communication may be permanently disrupted. This permanent denial of Service
can only be corrected via a cold restart of the ICS.
Detailed product description
We confirmed the bug on the following system:
FX3G-24M
CPU-Version: 2.10
FX3U-ENET-ADP Version: 1.20
Further products or firmware versions have not been tested

Description
The built-in HTTP application is unable to handle parameters with a length
of 100 bytes or more. This is true for all tested URLs but /fx_devmon.html.
Even parameters not used by the web applications trigger the DoS bug. This
security weakness can be exploited using both POST and GET HTTP requests.
As soon as any parameter with a length of at least 100 characters is
transmitted all Ethernet/IP/TCP communication is permanently halted. A
connected HMI looses its connection, the HTTP server is not available any
more and the System does not respond to ICMP ping requests or ARP requests.
The ICS has to undergo a cold restart be interrupting the power supply. The
PLC still continues to execute the internal logic program. Only the
Ethernet based communication is disrupted.

Proof of Concept
The following command (all on one line) crafts an GET request and sends it
to the PLC running on the IP address 192.168.155.80:
python -c "print 'GET /index.html?'+'A'*100 +' \ HTTP/1.1\r\n\r\n'" | nc
192.168.155.80 80

As soon as the command returns the communication is disrupted.

Severity and Ease of Exploitation
The security weakness can be easily exploited. No special tools are
necessary. The Exploit neither requires physical access to the ICS nor does
it require direct access to the ICS network. The exploit can be executed
across routers and if the ICS is connected to the internet across the
Internet. The HTTP- request is a normal and valid request and will not be
detected or prevented by Firewalls or Intrusion Prevention Systems.
The disruption of the Ethernet based communication will cause a permanent
loss of view on any connected HMIs and will prevent the communication of
the ICS with other ICS systems via Ethernet.

Vendor Communication
We unsuccessfully tried to contact the vendor for several month. We could
not find a security contact responsible for these products. On December 4th
2014 we contacted the ICS-CERT. The ICS-CERT contacted Mitsubishi.
Mitsubishi released a new firmware in April 2015. The new firmware will
only be available in all controllers shipped starting April 2015. Older
controllers will not receive the firmware update.

Formatted PDF:

Current thread: