CVE-2019-6543

9.8 CRITICAL

📋 TL;DR

CVE-2019-6543 is a critical vulnerability in AVEVA's InduSoft Web Studio and InTouch Edge HMI software where code executes with program runtime privileges, potentially allowing attackers to compromise the entire machine. This affects industrial control systems and SCADA environments using these HMI products. Attackers could gain full control of affected systems.

💻 Affected Systems

Products:
  • AVEVA InduSoft Web Studio
  • AVEVA InTouch Edge HMI (formerly InTouch Machine Edition)
Versions: InduSoft Web Studio prior to Version 8.1 SP3; InTouch Edge HMI prior to Version 2017 Update
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects industrial control systems and SCADA environments. These are typically deployed in critical infrastructure sectors.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of industrial control systems leading to operational disruption, safety hazards, data theft, or physical damage to industrial processes.

🟠

Likely Case

Remote code execution allowing attackers to install malware, steal sensitive industrial data, or disrupt HMI operations.

🟢

If Mitigated

Limited impact if systems are isolated, properly segmented, and have additional security controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available and can be executed without authentication. The vulnerability is actively exploited in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: InduSoft Web Studio Version 8.1 SP3 or later; InTouch Edge HMI Version 2017 Update or later

Vendor Advisory: https://ics-cert.us-cert.gov/advisories/ICSA-19-036-01

Restart Required: Yes

Instructions:

1. Download the latest version from AVEVA's official website. 2. Backup current configurations and projects. 3. Install the update following vendor instructions. 4. Restart the system. 5. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected HMI systems from untrusted networks and the internet.

Firewall Rules

all

Implement strict firewall rules to limit access to HMI systems only from authorized sources.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems from production networks and the internet.
  • Deploy additional security controls like application whitelisting, intrusion detection systems, and enhanced monitoring.

🔍 How to Verify

Check if Vulnerable:

Check the software version in the application's About dialog or through Windows Programs and Features.

Check Version:

Check via Windows Control Panel > Programs and Features or the application's Help > About menu.

Verify Fix Applied:

Verify the installed version matches or exceeds the patched versions: InduSoft Web Studio 8.1 SP3+ or InTouch Edge HMI 2017 Update+.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation, unexpected network connections from HMI software, authentication failures, or privilege escalation attempts.

Network Indicators:

  • Unexpected traffic to/from HMI systems, especially on non-standard ports or from unauthorized IP addresses.

SIEM Query:

Example: (process_name:"InduSoft*" OR process_name:"InTouch*") AND (event_type:"process_creation" OR event_type:"network_connection")

🔗 References

📤 Share & Export