Check Point Reference: | CPAI-2011-279 |
Date Published: | 15 Jun 2011 |
Severity: | Critical |
Last Updated: | Wednesday 15 June, 2011 |
Source: | |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Siemens Tecnomatix FactoryLink is a Supervisory Control and Data Acquisition (SCADA) system used for monitoring and controlling industrial processes. A possible file downloading vulnerability has been reported in Siemens Tecnomatix FactoryLink SCADA system. The vulnerability is due to a boundary error in Siemens Tecnomatix FactoryLink CSService while handling Filter message request sent to the server. A remote attacker could exploit this issue by sending a specially crafted CSService filter message to the target server. Successful exploitation of this vulnerability would lead to file downloading from the affected server. |
This protection will detect and block specially crafted CSService Filter message to the target server.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Application Servers Protection Violation.
Attack Information: Siemens Tecnomatix FactoryLink SCADA CSService Filter file download