CVE-2022-26082

9.1 CRITICAL

📋 TL;DR

CVE-2022-26082 is a critical file write vulnerability in Open Automation Software OAS Platform's SecureTransferFiles functionality that allows remote attackers to write arbitrary files to the system. This can lead to remote code execution by overwriting critical system files or deploying malicious payloads. Organizations running vulnerable versions of OAS Platform are affected.

💻 Affected Systems

Products:
  • Open Automation Software OAS Platform
Versions: V16.00.0112 and earlier versions
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration of the OAS Engine's SecureTransferFiles functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the OAS Platform server, potentially leading to lateral movement within the network, data exfiltration, or ransomware deployment.

🟠

Likely Case

Remote code execution allowing attackers to execute arbitrary commands, install backdoors, manipulate industrial control systems, or disrupt operations.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation attempts from reaching vulnerable systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending a specially-crafted series of network requests to the vulnerable functionality.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V16.00.0113 and later

Vendor Advisory: https://openautomationsoftware.com/security-advisory/

Restart Required: Yes

Instructions:

1. Download the latest version from Open Automation Software website. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart OAS services. 5. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to OAS Platform to only trusted sources using firewall rules.

Disable SecureTransferFiles

all

If not required, disable the SecureTransferFiles functionality in OAS configuration.

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to trusted IP addresses only
  • Deploy intrusion detection/prevention systems to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check OAS Platform version in administration interface or installation directory. Versions V16.00.0112 and earlier are vulnerable.

Check Version:

Check OAS configuration files or administration console for version information

Verify Fix Applied:

Verify OAS Platform version is V16.00.0113 or later and test SecureTransferFiles functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file write operations in OAS logs
  • Multiple failed or unusual SecureTransferFiles requests
  • Unexpected process creation from OAS services

Network Indicators:

  • Unusual traffic patterns to OAS Platform port 58727/TCP
  • Multiple sequential requests to SecureTransferFiles endpoint
  • Anomalous file transfer patterns

SIEM Query:

source="OAS_Platform" AND (event_type="file_write" OR endpoint="SecureTransferFiles") AND status="success"

🔗 References

📤 Share & Export