CVE-2021-43981

10.0 CRITICAL

📋 TL;DR

CVE-2021-43981 is a critical OS command injection vulnerability in mySCADA myPRO versions 8.20.0 and earlier. Attackers can execute arbitrary operating system commands through email parameters, potentially compromising the entire system. This affects industrial control systems using vulnerable mySCADA myPRO installations.

💻 Affected Systems

Products:
  • mySCADA myPRO
Versions: 8.20.0 and earlier
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with email functionality enabled are vulnerable. The vulnerability exists in the email sending feature.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary commands with system privileges, potentially disrupting industrial operations, stealing sensitive data, or deploying ransomware.

🟠

Likely Case

Attackers gain shell access to the underlying operating system, enabling lateral movement, data exfiltration, or installation of persistent backdoors.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the myPRO application server, though command execution remains possible.

🌐 Internet-Facing: HIGH - If exposed to the internet, attackers can remotely exploit this without authentication.
🏢 Internal Only: HIGH - Even internally, any user with network access to the myPRO interface can potentially exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is easily exploitable with publicly available proof-of-concept code. No authentication is required to trigger the vulnerable email function.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.21.0 and later

Vendor Advisory: https://www.cisa.gov/uscert/ics/advisories/icsa-21-355-01

Restart Required: Yes

Instructions:

1. Download mySCADA myPRO version 8.21.0 or later from the official vendor portal. 2. Backup current configuration and data. 3. Stop the myPRO service. 4. Install the updated version. 5. Restart the service and verify functionality.

🔧 Temporary Workarounds

Disable Email Functionality

all

Temporarily disable the email sending feature to prevent exploitation

Navigate to myPRO configuration > Email Settings > Disable all email functionality

Network Segmentation

all

Isolate myPRO systems from internet and restrict internal access

Configure firewall rules to block inbound connections to myPRO ports (typically 80, 443, 8080)

🧯 If You Can't Patch

  • Implement strict network access controls to limit connections to myPRO systems
  • Deploy application-level firewalls or WAFs with command injection detection rules

🔍 How to Verify

Check if Vulnerable:

Check myPRO version in the web interface or configuration files. Versions 8.20.0 or earlier are vulnerable.

Check Version:

mypro --version (Linux) or check About in web interface

Verify Fix Applied:

Verify version is 8.21.0 or later in the web interface or via 'mypro --version' command.

📡 Detection & Monitoring

Log Indicators:

  • Unusual email sending attempts with suspicious parameters
  • System command execution from myPRO process
  • Failed authentication attempts followed by email function calls

Network Indicators:

  • HTTP POST requests to email endpoints with command injection patterns
  • Outbound connections from myPRO to unexpected destinations

SIEM Query:

source="mypro" AND ("email" OR "sendmail") AND (cmd.exe OR /bin/bash OR powershell)

🔗 References

📤 Share & Export