CVE-2017-9664
📋 TL;DR
This vulnerability allows unauthenticated attackers to access internal files on ABB SREA-01 and SREA-50 remote monitoring tools via directory traversal attacks. Once the password file is retrieved, attackers can crack the hash and potentially execute commands. Affected systems include specific hardware revisions and software versions of these industrial control system devices.
💻 Affected Systems
- ABB SREA-01
- ABB SREA-50
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of industrial monitoring systems leading to unauthorized command execution, potential manipulation of industrial processes, and lateral movement within operational technology networks.
Likely Case
Unauthorized access to sensitive configuration files, password hash theft, and potential credential compromise leading to unauthorized system access.
If Mitigated
Limited impact if proper network segmentation and access controls prevent external access to vulnerable systems.
🎯 Exploit Status
Exploit involves simple HTTP requests with directory traversal sequences; password cracking requires additional tools but is straightforward.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: SREA-01: above 3.31.5; SREA-50: above 3.32.8
Vendor Advisory: https://ics-cert.us-cert.gov/advisories/ICSA-17-222-05
Restart Required: Yes
Instructions:
1. Contact ABB for updated firmware. 2. Backup configuration. 3. Apply firmware update. 4. Restart device. 5. Verify new version is running.
🔧 Temporary Workarounds
Network Segmentation
allIsolate vulnerable devices in separate network segments with strict firewall rules.
Access Control Lists
allImplement strict IP-based access controls to limit HTTP access to authorized management stations only.
🧯 If You Can't Patch
- Implement network-level authentication (VPN, client certificates) before allowing access to device management interfaces.
- Deploy web application firewall (WAF) with directory traversal protection rules in front of vulnerable devices.
🔍 How to Verify
Check if Vulnerable:
Attempt HTTP request to device with path traversal payload (e.g., GET /../../etc/passwd) and check for file disclosure.
Check Version:
Check device web interface or use SNMP query to verify firmware version is above vulnerable thresholds.
Verify Fix Applied:
After patching, attempt same directory traversal attacks; should receive error or access denied instead of file contents.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests containing '../' sequences
- Unusual file access patterns from unauthorized IPs
- Multiple failed authentication attempts following file access
Network Indicators:
- HTTP requests with directory traversal patterns to industrial devices
- Traffic to/from industrial devices from unexpected sources
SIEM Query:
source_ip=* AND (http_uri CONTAINS '../' OR http_uri CONTAINS '..\\') AND dest_ip=[ABB_DEVICE_IP_RANGE]