← Advisories

GEOVAP Reliance 4 Control Server Unquoted Service Path Elevation Of Privilege

Low
Advisory ID
ZSL-2015-5285
Release Date
07 December 2015
Vendor
GEOVAP, spol. s r.o. - http://www.reliance-scada.com
Affected Version
4.7.1 (Revision 25172)
CVE
N/A
Tested On
Microsoft Windows 7 Professional SP1 (EN), Microsoft Windows 7 Ultimate SP1 (EN)
Summary

Reliance is a professional SCADA/HMI system designed for the visualization and control of industrial processes and for building automation.

Description

The application suffers from an unquoted search path issue impacting the service 'RelianceOpcDaWrapper' for Windows deployed as part of Reliance 4 SCADA/HMI system installer including Reliance OPC Server. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user’s code would execute with the elevated privileges of the application.

Proof of Concept
Disclosure Timeline
14.10.2015Vulnerability discovered.
19.10.2015Vendor contacted.
19.10.2015Vendor responds asking more details.
19.10.2015Sent details to the vendor.
19.10.2015Vendor forwards report to responsible person.
20.10.2015Vendor confirms the issue creating a fix that will be part of next pre-release of Reliance.
20.10.2015Asked vendor for patch release date.
21.10.2015Vendor promises new pre-release version within the next 3 weeks followed by the release of the official version.
15.11.2015Asked vendor for status update.
15.11.2015Vendor informs about scheduled patch release date.
23.11.2015Vendor releases pre-release version 4.7.2 (rev 26766) only to registered customers to address this issue.
23.11.2015ZSL verifies fix.
23.11.2015Vendor informs official stable (public) release planned for December.
07.12.2015Public security advisory released.
Credits
Vulnerability discovered by Gjoko Krstic
References
Changelog
07.12.2015Initial release
08.12.2015Added reference [1], [2], [3] and [4]