CVE-2019-13585
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary code on FANUC Robotics Virtual Robot Controller 8.23 by sending a specially crafted HTTP request to the admin webserver, causing a buffer overflow. It affects industrial control systems using this specific FANUC software version.
💻 Affected Systems
- FANUC Robotics Virtual Robot Controller
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing remote code execution, potential takeover of robotic control systems, and physical safety risks in industrial environments.
Likely Case
Remote code execution leading to unauthorized access, data theft, or disruption of robotic operations.
If Mitigated
Limited impact if webserver is isolated from critical control systems and network segmentation is implemented.
🎯 Exploit Status
Public exploit code exists in Packet Storm and other security advisories. The vulnerability requires sending a forged HTTP request to the admin interface.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check with FANUC for updated version
Vendor Advisory: Contact FANUC directly as no public advisory URL is provided in references
Restart Required: Yes
Instructions:
1. Contact FANUC support for patch availability 2. Apply the official patch 3. Restart the controller 4. Verify the fix
🔧 Temporary Workarounds
Network Isolation
allIsolate the controller from untrusted networks and restrict access to admin webserver
Access Control
allImplement strict firewall rules to limit HTTP access to trusted IP addresses only
🧯 If You Can't Patch
- Segment the network to isolate the controller from other systems
- Implement strict network access controls and monitor for suspicious HTTP traffic
🔍 How to Verify
Check if Vulnerable:
Check controller software version. If running 8.23, assume vulnerable. Test with controlled exploit if authorized.
Check Version:
Check through FANUC controller interface or consult system documentation
Verify Fix Applied:
Verify software version is updated beyond 8.23 and test that forged HTTP requests no longer cause buffer overflow.
📡 Detection & Monitoring
Log Indicators:
- Unusual HTTP requests to admin interface
- Buffer overflow error messages in system logs
- Unexpected process crashes
Network Indicators:
- Malformed HTTP requests to controller port
- Traffic patterns indicating exploit attempts
SIEM Query:
source_ip:* dest_ip:CONTROLLER_IP dest_port:80 OR dest_port:443 http_request:*admin* AND (http_request_length > threshold OR contains(http_request, overflow_pattern))
🔗 References
- http://packetstormsecurity.com/files/153671/FANUC-Robotics-Virtual-Robot-Controller-8.23-Buffer-Overflow.html
- https://seclists.org/bugtraq/2019/Jul/24
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-024.txt
- http://packetstormsecurity.com/files/153671/FANUC-Robotics-Virtual-Robot-Controller-8.23-Buffer-Overflow.html
- https://seclists.org/bugtraq/2019/Jul/24
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-024.txt