CVE-2021-43938

8.1 HIGH

📋 TL;DR

CVE-2021-43938 allows unauthenticated attackers to access sensitive files on Elcomplus SmartPTT SCADA Server without credentials. This affects organizations using this industrial control system software for critical infrastructure monitoring. The vulnerability exposes configuration files, logs, and potentially sensitive operational data.

💻 Affected Systems

Products:
  • Elcomplus SmartPTT SCADA Server
Versions: All versions prior to 1.5.0.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations with web interface enabled. Industrial control systems using this SCADA software for monitoring and control.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access critical configuration files containing credentials, encryption keys, or system architecture details, enabling further attacks on SCADA systems or physical infrastructure disruption.

🟠

Likely Case

Unauthorized access to sensitive files revealing system configuration, user information, or operational data that could be used for reconnaissance or targeted attacks.

🟢

If Mitigated

Limited exposure with proper network segmentation and access controls preventing external attackers from reaching vulnerable interfaces.

🌐 Internet-Facing: HIGH - Direct exposure allows remote unauthenticated file access without any credentials required.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could still exploit this, but network segmentation reduces exposure.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP requests to specific endpoints can retrieve files. No authentication or special tools required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.5.0.0 and later

Vendor Advisory: https://www.cisa.gov/uscert/ics/advisories/icsa-22-109-05

Restart Required: Yes

Instructions:

1. Download SmartPTT SCADA Server version 1.5.0.0 or later from Elcomplus. 2. Backup current configuration and data. 3. Install the updated version following vendor instructions. 4. Restart the SCADA server service. 5. Verify functionality and monitor for issues.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate SmartPTT SCADA Server from untrusted networks using firewalls or network segmentation.

Access Control Lists

windows

Implement strict firewall rules to limit access to SCADA server ports (typically HTTP/HTTPS) to authorized IP addresses only.

# Example Windows firewall rule (adjust ports):
netsh advfirewall firewall add rule name="Block SmartPTT External" dir=in action=block protocol=TCP localport=80,443 remoteip=any

🧯 If You Can't Patch

  • Implement network segmentation to isolate the SCADA server from untrusted networks and internet access.
  • Deploy web application firewall (WAF) rules to block unauthorized file access patterns and monitor for exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Attempt to access http://[server-ip]/[sensitive-file-path] without authentication. If files are returned, system is vulnerable.

Check Version:

Check SmartPTT SCADA Server version in application interface or Windows Programs and Features. Should show 1.5.0.0 or higher.

Verify Fix Applied:

After patching, attempt the same unauthenticated file access requests. They should return authentication errors or be blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated HTTP requests to file paths
  • Access to sensitive file extensions (.config, .log, .txt) from unauthorized IPs
  • Increased 401/403 errors after patching

Network Indicators:

  • Unusual file retrieval patterns via HTTP
  • Requests to known vulnerable endpoints from external IPs
  • Traffic to SCADA web interface from unauthorized sources

SIEM Query:

source="web_server" AND (uri="*.config" OR uri="*.log" OR uri="*.txt") AND status=200 AND auth="none"

🔗 References

📤 Share & Export