CVE-2021-43989

7.5 HIGH

📋 TL;DR

mySCADA myPRO versions 8.20.0 and prior store passwords using the weak MD5 hashing algorithm, which allows attackers who obtain password hashes to crack them relatively easily. This affects industrial control systems using vulnerable mySCADA software, potentially compromising SCADA/HMI systems.

💻 Affected Systems

Products:
  • mySCADA myPRO
Versions: 8.20.0 and prior
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations using default password storage mechanism. Industrial control systems using mySCADA for HMI/SCADA applications are primarily impacted.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise leading to unauthorized control of industrial processes, data manipulation, or operational disruption in critical infrastructure environments.

🟠

Likely Case

Attackers gain authenticated access to SCADA/HMI systems, enabling data theft, configuration changes, or lateral movement within industrial networks.

🟢

If Mitigated

Limited impact due to network segmentation, strong authentication controls, and monitoring that detects hash extraction attempts.

🌐 Internet-Facing: MEDIUM - If exposed to internet, attackers could potentially access hashes through other vulnerabilities, but direct exploitation requires hash extraction first.
🏢 Internal Only: HIGH - In industrial networks, attackers with internal access can extract and crack hashes to escalate privileges within SCADA systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires first obtaining password hashes through other means (database access, file read vulnerabilities, etc.), then using MD5 cracking tools like hashcat or rainbow tables.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.21.0 or later

Vendor Advisory: https://www.cisa.gov/uscert/ics/advisories/icsa-21-355-01

Restart Required: Yes

Instructions:

1. Download mySCADA myPRO version 8.21.0 or later from official vendor sources. 2. Backup current configuration and data. 3. Install the updated version following vendor documentation. 4. Restart the myPRO service/application. 5. Force password resets for all user accounts to generate new secure hashes.

🔧 Temporary Workarounds

Enforce Strong Password Policy

all

Implement complex password requirements to make MD5 cracking more difficult

Network Segmentation

all

Isolate mySCADA systems from general network access

🧯 If You Can't Patch

  • Implement multi-factor authentication for all mySCADA access
  • Monitor for unauthorized access attempts and hash extraction activities

🔍 How to Verify

Check if Vulnerable:

Check myPRO version in application interface or configuration files. Versions 8.20.0 or earlier are vulnerable.

Check Version:

Check application about dialog or configuration files for version information

Verify Fix Applied:

Verify installation of version 8.21.0 or later and confirm password hashes are no longer using MD5 (check database or configuration storage).

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts
  • Unusual database access patterns
  • Password hash extraction attempts

Network Indicators:

  • Unusual outbound connections from mySCADA systems
  • Traffic patterns suggesting hash dumping

SIEM Query:

source="mySCADA" AND (event_type="authentication_failure" OR event_type="database_access")

🔗 References

📤 Share & Export