CVE-2022-1737
📋 TL;DR
This vulnerability in Pyramid Solutions' EtherNet/IP products allows an unauthorized attacker to send specially crafted packets causing an out-of-bounds write. This can lead to denial-of-service conditions affecting industrial control systems. Organizations using Pyramid Solutions' Developer and DLL kits for EtherNet/IP Adapter and Scanner are affected.
💻 Affected Systems
- Pyramid Solutions Developer Kit for EtherNet/IP Adapter
- Pyramid Solutions Developer Kit for EtherNet/IP Scanner
- Pyramid Solutions DLL Kit for EtherNet/IP Adapter
- Pyramid Solutions DLL Kit for EtherNet/IP Scanner
📦 What is this software?
Netstax Ethernet\/ip Adapter Development Kit by Pyramidsolutions
View all CVEs affecting Netstax Ethernet\/ip Adapter Development Kit →
Netstax Ethernet\/ip Adapter Dll Kit by Pyramidsolutions
View all CVEs affecting Netstax Ethernet\/ip Adapter Dll Kit →
⚠️ Risk & Real-World Impact
Worst Case
Complete system crash or device reboot causing operational disruption in industrial environments, potentially affecting critical infrastructure processes.
Likely Case
Denial-of-service affecting EtherNet/IP communication, disrupting industrial automation processes and requiring manual intervention to restore functionality.
If Mitigated
Limited impact with proper network segmentation and monitoring, potentially causing temporary communication interruptions without affecting core industrial processes.
🎯 Exploit Status
No authentication required, network-accessible, and out-of-bounds write vulnerabilities are often easier to exploit than other memory corruption issues.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Contact Pyramid Solutions for specific patched versions
Vendor Advisory: https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-04
Restart Required: Yes
Instructions:
1. Contact Pyramid Solutions for updated versions
2. Update affected Developer and DLL kits
3. Recompile and redeploy applications using updated kits
4. Restart affected systems and devices
🔧 Temporary Workarounds
Network Segmentation
allIsolate EtherNet/IP devices and development systems from untrusted networks
Firewall Rules
allRestrict access to EtherNet/IP ports (typically TCP/UDP 44818) to authorized systems only
🧯 If You Can't Patch
- Implement strict network segmentation and firewall rules to limit access to affected systems
- Monitor network traffic for anomalous EtherNet/IP packets and implement intrusion detection
🔍 How to Verify
Check if Vulnerable:
Check if using Pyramid Solutions EtherNet/IP Developer or DLL kits. Review system documentation and installed software.
Check Version:
Contact Pyramid Solutions for version verification tools specific to their products
Verify Fix Applied:
Verify with Pyramid Solutions that updated kits are installed and applications have been recompiled with patched versions.
📡 Detection & Monitoring
Log Indicators:
- System crashes
- Unexpected reboots
- EtherNet/IP communication failures
- Memory access violation errors
Network Indicators:
- Malformed EtherNet/IP packets
- Unusual traffic patterns on port 44818
- Packets with abnormal structure or size
SIEM Query:
source="network" AND (port=44818 OR protocol="EtherNet/IP") AND (packet_size>normal OR malformed_packet=true)