CVE-2021-38442

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code by tricking users into opening malicious project files in FATEK Automation WinProladder. It affects all users of WinProladder version 3.30 and earlier who open untrusted project files.

💻 Affected Systems

Products:
  • FATEK Automation WinProladder
Versions: 3.30 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is triggered when parsing project files (.wlp extension).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through remote code execution, potentially allowing attackers to manipulate industrial control systems or steal sensitive data.

🟠

Likely Case

Local privilege escalation or system compromise when users open malicious project files from untrusted sources.

🟢

If Mitigated

Limited impact if proper network segmentation and file validation controls prevent malicious files from reaching vulnerable systems.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction to open malicious project file. No public exploit code available as of advisory publication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.31 or later

Vendor Advisory: https://us-cert.cisa.gov/ics/advisories/icsa-21-280-06

Restart Required: Yes

Instructions:

1. Download WinProladder version 3.31 or later from FATEK Automation website. 2. Uninstall previous version. 3. Install updated version. 4. Restart system.

🔧 Temporary Workarounds

Restrict project file access

windows

Only open project files from trusted sources and implement file validation controls.

Network segmentation

all

Isolate WinProladder systems from untrusted networks and implement application whitelisting.

🧯 If You Can't Patch

  • Implement strict file validation policies to only allow trusted .wlp files
  • Run WinProladder in isolated virtual environments with limited privileges

🔍 How to Verify

Check if Vulnerable:

Check WinProladder version in Help > About menu. If version is 3.30 or earlier, system is vulnerable.

Check Version:

Not applicable - check via application GUI

Verify Fix Applied:

Verify version is 3.31 or later in Help > About menu after update.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected crashes of WinProladder.exe
  • Unusual file access patterns to .wlp files

Network Indicators:

  • Unusual network connections originating from WinProladder process

SIEM Query:

Process:WinProladder.exe AND (EventID:1000 OR FileExtension:.wlp)

🔗 References

📤 Share & Export