CVE-2015-7911

9.1 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to gain administrative access to Saia Burgess industrial control system devices via hardcoded FTP credentials. Affected organizations include industrial facilities, manufacturing plants, and critical infrastructure using these specific PCD series controllers. Attackers can fully compromise device security without needing legitimate credentials.

💻 Affected Systems

Products:
  • PCD1.M0xx0
  • PCD1.M2xx0
  • PCD2.M5xx0
  • PCD3.Mxx60
  • PCD3.Mxxx0
  • PCD7.D4xxD
  • PCD7.D4xxV
  • PCD7.D4xxWTPF
  • PCD7.D4xxxT5F
  • PCD3.T665
  • PCD3.T666
Versions: All versions before 1.24.50 for most devices, before 1.24.41 for PCD3.T665/T666
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: FTP service is typically enabled by default on these industrial controllers.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of industrial control systems leading to operational disruption, safety hazards, data theft, or physical damage to industrial processes.

🟠

Likely Case

Unauthorized access to device configuration, potential malware installation, data exfiltration, and disruption of industrial operations.

🟢

If Mitigated

Limited impact if devices are air-gapped, network segmentation prevents FTP access, or compensating controls detect unauthorized access attempts.

🌐 Internet-Facing: HIGH - FTP service accessible from internet allows complete remote compromise without authentication.
🏢 Internal Only: HIGH - Even internally, any network access to FTP service provides administrative control.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only FTP client access to device IP with hardcoded credentials. No special tools or skills needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.24.50 for most devices, 1.24.41 for PCD3.T665/T666

Vendor Advisory: https://ics-cert.us-cert.gov/advisories/ICSA-15-335-01

Restart Required: Yes

Instructions:

1. Download firmware update from Saia Burgess support portal. 2. Backup current configuration. 3. Apply firmware update via appropriate method (USB, network). 4. Verify successful update. 5. Change all default credentials after update.

🔧 Temporary Workarounds

Disable FTP Service

all

Disable FTP service on affected devices if not required for operations.

Device-specific configuration command to disable FTP service

Network Segmentation

linux

Isolate affected devices in separate VLAN with strict firewall rules blocking FTP access.

# Example firewall rule: iptables -A INPUT -p tcp --dport 21 -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to block all FTP traffic (port 21) to affected devices
  • Monitor FTP authentication logs for unauthorized access attempts and implement intrusion detection

🔍 How to Verify

Check if Vulnerable:

Attempt FTP connection to device port 21 using known hardcoded credentials (consult ICS-CERT advisory for specifics).

Check Version:

Device-specific command via web interface or serial console to display firmware version

Verify Fix Applied:

Verify firmware version is at or above patched version and test that hardcoded credentials no longer work.

📡 Detection & Monitoring

Log Indicators:

  • Successful FTP logins from unexpected IPs
  • Multiple failed FTP login attempts
  • Configuration changes via FTP

Network Indicators:

  • FTP traffic to industrial control devices
  • Port 21 connections from external networks

SIEM Query:

source_port=21 AND (dest_ip IN [industrial_device_ips])

🔗 References

📤 Share & Export