CVE-2021-43556
📋 TL;DR
CVE-2021-43556 is a stack-based buffer overflow vulnerability in FATEK WinProladder PLC programming software. Attackers can execute arbitrary code by tricking users into opening malicious project files. Organizations using WinProladder versions 3.30_24518 and earlier for industrial control systems are affected.
💻 Affected Systems
- FATEK WinProladder
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining full control of the engineering workstation, potentially enabling lateral movement to PLCs and other industrial systems.
Likely Case
Attacker executes arbitrary code on the engineering workstation, potentially stealing credentials, modifying PLC programs, or disrupting industrial processes.
If Mitigated
Limited impact with proper network segmentation and user awareness preventing malicious file execution.
🎯 Exploit Status
Exploitation requires user interaction to open malicious project files; multiple advisories from ZDI indicate weaponization is likely.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 3.30_24519 or later
Vendor Advisory: https://us-cert.cisa.gov/ics/advisories/icsa-21-320-01
Restart Required: Yes
Instructions:
1. Download latest version from FATEK website. 2. Uninstall current version. 3. Install updated version. 4. Restart system.
🔧 Temporary Workarounds
Restrict project file execution
windowsConfigure Windows to open .wp3 files with a text editor instead of WinProladder
assoc .wp3=txtfile
ftype txtfile=%SystemRoot%\system32\NOTEPAD.EXE %1
Application whitelisting
windowsUse AppLocker or similar to restrict execution of WinProladder to trusted users only
🧯 If You Can't Patch
- Segment engineering workstations from production networks using firewalls
- Implement strict user awareness training about opening untrusted project files
🔍 How to Verify
Check if Vulnerable:
Check WinProladder version in Help > About; if version is 3.30_24518 or earlier, system is vulnerable.
Check Version:
Check Help > About in WinProladder GUI (no CLI command available)
Verify Fix Applied:
Verify version is 3.30_24519 or later in Help > About menu.
📡 Detection & Monitoring
Log Indicators:
- Application crashes of WinProladder.exe
- Unusual process creation from WinProladder
Network Indicators:
- Unexpected network connections from engineering workstations
SIEM Query:
EventID=1000 OR EventID=1001 AND ProcessName="WinProladder.exe"
🔗 References
- https://us-cert.cisa.gov/ics/advisories/icsa-21-320-01
- https://www.zerodayinitiative.com/advisories/ZDI-22-029/
- https://www.zerodayinitiative.com/advisories/ZDI-22-031/
- https://www.zerodayinitiative.com/advisories/ZDI-22-032/
- https://us-cert.cisa.gov/ics/advisories/icsa-21-320-01
- https://www.zerodayinitiative.com/advisories/ZDI-22-029/
- https://www.zerodayinitiative.com/advisories/ZDI-22-031/
- https://www.zerodayinitiative.com/advisories/ZDI-22-032/