CVE-2022-25359

9.1 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to modify files on ICL ScadaFlex II SCADA controllers. Attackers can overwrite, delete, or create files without any authentication, potentially disrupting industrial control systems. This affects SC-1 and SC-2 controllers running version 1.03.07.

💻 Affected Systems

Products:
  • ICL ScadaFlex II SCADA Controller SC-1
  • ICL ScadaFlex II SCADA Controller SC-2
Versions: 1.03.07
Operating Systems: Embedded/SCADA-specific OS
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the affected firmware version are vulnerable in default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to modify critical SCADA configuration files, disrupt industrial processes, cause physical damage, or establish persistent backdoors.

🟠

Likely Case

Unauthorized file modifications leading to service disruption, configuration changes, or data corruption affecting SCADA operations.

🟢

If Mitigated

Limited impact if controllers are isolated in air-gapped networks with strict access controls and file integrity monitoring.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation allows direct attacks from internet without any credentials.
🏢 Internal Only: HIGH - Even internally, any network access to these devices allows exploitation without authentication.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available on Packet Storm Security. Attack requires network access but no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Contact ICL for firmware updates or replacement options.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate SCADA controllers in separate network segments with strict firewall rules

Access Control Lists

all

Implement strict network ACLs to limit access to SCADA controllers to authorized systems only

🧯 If You Can't Patch

  • Deploy network-based intrusion prevention systems (IPS) with rules to block exploitation attempts
  • Implement strict network segmentation and zero-trust architecture principles

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or serial console. If version is 1.03.07, device is vulnerable.

Check Version:

Check via web interface at http://[device-ip]/status or via serial console connection

Verify Fix Applied:

Verify firmware has been updated to a version later than 1.03.07 or device has been replaced.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized file modification attempts
  • Unexpected file system changes
  • Authentication bypass logs

Network Indicators:

  • Unusual file transfer patterns to SCADA controllers
  • Unauthorized access attempts to SCADA network segments

SIEM Query:

source_ip=* AND dest_ip=[scada_ip] AND (protocol=HTTP OR protocol=FTP) AND action=file_modify

🔗 References

📤 Share & Export