CVE-2020-13559
📋 TL;DR
A denial-of-service vulnerability exists in FreyrSCADA IEC-60879-5-104 Server Simulator's traffic-logging functionality where specially crafted packets can crash the service. This affects organizations using FreyrSCADA IEC-60879-5-104 Server Simulator version 21.04.028 for industrial control system testing and development.
💻 Affected Systems
- FreyrSCADA IEC-60879-5-104 Server Simulator
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete service disruption of the SCADA simulator, potentially affecting testing/development environments and causing operational impacts if used in production-like scenarios.
Likely Case
Service crash requiring manual restart of the simulator application, disrupting testing and development activities.
If Mitigated
Minimal impact with proper network segmentation and monitoring in place to detect and block malicious packets.
🎯 Exploit Status
The vulnerability requires sending specially crafted packets to the vulnerable service, which is relatively straightforward for attackers familiar with IEC 60870-5-104 protocol.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check with vendor for updated version
Vendor Advisory: https://talosintelligence.com/vulnerability_reports/TALOS-2020-1174
Restart Required: Yes
Instructions:
1. Contact FreyrSCADA vendor for patch information
2. Apply vendor-provided patch
3. Restart the FreyrSCADA IEC-60879-5-104 Server Simulator service
4. Verify the fix by testing with normal traffic
🔧 Temporary Workarounds
Disable traffic logging
windowsTemporarily disable the vulnerable traffic-logging functionality if not essential for operations
Check FreyrSCADA documentation for logging configuration options
Network segmentation
allIsolate the simulator from untrusted networks using firewalls
Configure firewall rules to restrict access to TCP port 2404 (standard IEC 60870-5-104 port)
🧯 If You Can't Patch
- Implement strict network access controls to limit which systems can communicate with the simulator
- Deploy intrusion detection systems to monitor for anomalous IEC 60870-5-104 traffic patterns
🔍 How to Verify
Check if Vulnerable:
Check if running FreyrSCADA IEC-60879-5-104 Server Simulator version 21.04.028 with traffic logging enabled
Check Version:
Check application version through FreyrSCADA interface or Windows Programs and Features
Verify Fix Applied:
Test with normal IEC 60870-5-104 traffic after patch application to ensure service remains stable
📡 Detection & Monitoring
Log Indicators:
- Unexpected service crashes or restarts
- Error messages related to traffic logging or packet processing
Network Indicators:
- Malformed IEC 60870-5-104 packets targeting port 2404
- Unusual traffic patterns to the simulator
SIEM Query:
source="freyrscada" AND (event_type="crash" OR event_type="error") OR destination_port=2404 AND packet_size_anomaly=true