ID

VAR-E-201509-0449


CVE

cve_id:CVE-2015-3938

Trust: 0.8

sources: BID: 76885 // PACKETSTORM: 133780

TITLE

Mitsubishi Melsec FX3G-24M Denial Of Service

Trust: 0.5

sources: PACKETSTORM: 133780

DESCRIPTION

Mitsubishi Melsec FX3G-24M suffers from a denial of service vulnerability.

Trust: 0.5

sources: PACKETSTORM: 133780

AFFECTED PRODUCTS

vendor:mitsubishimodel:melsec fx3g-24mscope: - version: -

Trust: 0.5

vendor:mitsubishimodel:electric melsec fx3g-24mscope:eqversion:2.10

Trust: 0.3

vendor:mitsubishimodel:electric melsec fx3g series plcscope:eqversion:0

Trust: 0.3

vendor:mitsubishimodel:electric fx3u-enet-adpscope:eqversion:1.20

Trust: 0.3

sources: BID: 76885 // PACKETSTORM: 133780

EXPLOIT

OS-S Security Advisory 2015-03

Date: September 29th, 2015
CVE: CVE-2015-3938
CVSS: 5 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

Title: Mitsubishi ICS FX3G-24M Permanent Communication Denial of Service

Severity: Critical.
The TCP/IP communication of the Mitsubishi Melsec FX3G-24 is
permanently disrupted.

Ease of Exploitation: Trivial

Vulnerability type: Wrong input validation (buffer overflow?)

Products: Mitsubishi Melsec FX3G-24M

Abstract
The Mitsubishi Melsec FX3G-24M is a highly integrated Industrial Control
System (ICS). Many functions of the ICS may be controlled via the built-in
HTTP-Server. By using specially crafted HTTP-messages all Ethernet based
communication may be permanently disrupted. This permanent denial of Service
can only be corrected via a cold restart of the ICS.
Detailed product description
We confirmed the bug on the following system:
FX3G-24M
CPU-Version: 2.10
FX3U-ENET-ADP Version: 1.20
Further products or firmware versions have not been tested

Description
The built-in HTTP application is unable to handle parameters with a length of
100 bytes or more. This is true for all tested URLs but /fx_devmon.html. Even
parameters not used by the web applications trigger the DoS bug. This security
weakness can be exploited using both POST and GET HTTP requests.
As soon as any parameter with a length of at least 100 characters is
transmitted all Ethernet/IP/TCP communication is permanently halted. A
connected HMI looses its connection, the HTTP server is not available any more
and the System does not respond to ICMP ping requests or ARP requests.
The ICS has to undergo a cold restart be interrupting the power supply.
The PLC still continues to execute the internal logic program. Only the
Ethernet based communication is disrupted.

Proof of Concept
The following command (all on one line) crafts an GET request and sends it to
the PLC running on the IP address 192.168.155.80:
python -c "print 'GET /index.html?'+'A'*100 +' \ HTTP/1.1\r\n\r\n'" | nc
192.168.155.80 80

As soon as the command returns the communication is disrupted.

Severity and Ease of Exploitation
The security weakness can be easily exploited. No special tools are necessary.
The Exploit neither requires physical access to the ICS nor does it require
direct access to the ICS network. The exploit can be executed across routers
and if the ICS is connected to the internet across the Internet. The HTTP-
request is a normal and valid request and will not be detected or prevented by
Firewalls or Intrusion Prevention Systems.
The disruption of the Ethernet based communication will cause a permanent loss
of view on any connected HMIs and will prevent the communication of the ICS
with other ICS systems via Ethernet.

Vendor Communication
We unsuccessfully tried to contact the vendor for several month. We could not
find a security contact responsible for these products. On December 4th 2014
we contacted the ICS-CERT. The ICS-CERT contacted Mitsubishi. Mitsubishi
released a new firmware in April 2015. The new firmware will only be available
in all controllers shipped starting April 2015. Older controllers will not
receive the firmware update.

Formatted PDF:
--
OpenSource Security Ralf Spenneberg http://www.os-s.de
Am Bahnhof 3-5 48565 Steinfurt Germany
Fon: +49(0)2552 638 755 Fax: +49(0)2552 638 757

Trust: 0.5

sources: PACKETSTORM: 133780

EXPLOIT HASH

LOCAL

SOURCE

md5: 2a10a9dca38e65e0d1a507ad24a8483e
sha-1: 2a1f338c5f00f5120bb5cd779273bafd0f129cdd
sha-256: 11305edb69fbaa63801ee810fdf8c773dad4fb7309cec538b632d1ce094cd87e
md5: 2a10a9dca38e65e0d1a507ad24a8483e

Trust: 0.5

sources: PACKETSTORM: 133780

PRICE

free

Trust: 0.5

sources: PACKETSTORM: 133780

TYPE

Failure to Handle Exceptional Conditions

Trust: 0.3

sources: BID: 76885

TAGS

tag:exploit

Trust: 0.5

tag:denial of service

Trust: 0.5

sources: PACKETSTORM: 133780

CREDITS

Ralf Spenneberg

Trust: 0.5

sources: PACKETSTORM: 133780

EXTERNAL IDS

db:NVDid:CVE-2015-3938

Trust: 0.8

db:PACKETSTORMid:133780

Trust: 0.5

db:ICS CERTid:ICSA-15-146-01

Trust: 0.3

db:BIDid:76885

Trust: 0.3

sources: BID: 76885 // PACKETSTORM: 133780

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2015-3938

Trust: 0.5

url:http://www.mitsubishi-automation.com/products/software_mx_components_content.htm

Trust: 0.3

url:https://ics-cert.us-cert.gov/advisories/icsa-15-146-01

Trust: 0.3

url:http://www.os-s.net/advisories/mitsubishi_fx3ge_parameter_error-engl.pdf

Trust: 0.3

sources: BID: 76885 // PACKETSTORM: 133780

SOURCES

db:BIDid:76885
db:PACKETSTORMid:133780

LAST UPDATE DATE

2022-07-27T09:15:26.907000+00:00


SOURCES UPDATE DATE

db:BIDid:76885date:2015-11-03T19:51:00

SOURCES RELEASE DATE

db:BIDid:76885date:2015-09-29T00:00:00
db:PACKETSTORMid:133780date:2015-09-30T04:08:00