CVE-2020-13499
📋 TL;DR
This vulnerability allows unauthenticated attackers to execute arbitrary SQL commands on eDNA Enterprise Data Historian systems via specially crafted SOAP requests to the CHaD.asmx web service. Successful exploitation can lead to complete compromise of the database and potentially the underlying system. Organizations using affected versions of eDNA Enterprise Data Historian are at risk.
💻 Affected Systems
- eDNA Enterprise Data Historian
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, manipulation, or destruction; potential remote code execution on the database server; full system compromise of the historian server.
Likely Case
Unauthorized access to sensitive industrial process data, configuration data theft, potential manipulation of historical data affecting operations.
If Mitigated
Limited impact with proper network segmentation, web application firewalls, and input validation controls in place.
🎯 Exploit Status
Exploitation is straightforward using standard SQL injection techniques via SOAP requests. Public proof-of-concept code exists in security advisories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 7.6.0.0 or later
Vendor Advisory: https://us-cert.cisa.gov/ics/advisories/icsa-20-254-01
Restart Required: Yes
Instructions:
1. Download and install eDNA Enterprise Data Historian version 7.6.0.0 or later from GE Digital. 2. Apply all security patches and updates. 3. Restart the eDNA services and verify functionality.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to the eDNA historian web services to only trusted hosts and networks.
Configure firewall rules to block external access to port 80/443 on eDNA server
Implement network segmentation using VLANs or separate network zones
Web Application Firewall
allDeploy a WAF with SQL injection protection rules in front of the eDNA web services.
Configure WAF rules to block SQL injection patterns in SOAP requests
Enable input validation and sanitization rules
🧯 If You Can't Patch
- Implement strict network access controls to limit exposure of the vulnerable service
- Deploy intrusion detection/prevention systems with SQL injection signatures
🔍 How to Verify
Check if Vulnerable:
Check eDNA version via the web interface or by examining installed software in Windows Programs and Features. If version is 3.0.1.2 or 7.5.4989.33053, the system is vulnerable.
Check Version:
Check Windows registry: HKEY_LOCAL_MACHINE\SOFTWARE\GE\eDNA\Version or examine installed programs list
Verify Fix Applied:
Verify installation of version 7.6.0.0 or later. Test the CHaD.asmx endpoint with SQL injection payloads to confirm they are blocked.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple failed login attempts or SQL errors in web server logs
- SOAP requests with SQL keywords in InstancePath parameter
Network Indicators:
- Unusual SOAP traffic patterns to CHaD.asmx
- SQL injection patterns in HTTP POST requests
- Unexpected database connections from web server
SIEM Query:
source="web_logs" AND (url="*CHaD.asmx*" AND (param="*InstancePath*" AND (value="*SELECT*" OR value="*UNION*" OR value="*INSERT*" OR value="*DELETE*")))