CVE-2022-43763

7.5 HIGH

📋 TL;DR

This vulnerability in B&R APROL's Tbase server allows insufficient precondition checks when calling commands, potentially leading to Denial of Service conditions. It affects industrial automation systems running B&R APROL versions before R 4.2-07, primarily impacting manufacturing and industrial control environments.

💻 Affected Systems

Products:
  • B&R APROL
Versions: All versions < R 4.2-07
Operating Systems: Industrial control system platforms running APROL
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the Tbase server component within APROL systems used for industrial automation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system unavailability of the Tbase server, disrupting industrial automation processes and potentially causing production downtime.

🟠

Likely Case

Service disruption of the Tbase server component, affecting specific automation functions without necessarily crashing the entire system.

🟢

If Mitigated

Minimal impact with proper network segmentation and access controls limiting who can interact with the Tbase server.

🌐 Internet-Facing: MEDIUM - While industrial systems shouldn't be internet-facing, misconfigurations could expose this vulnerability to external attackers.
🏢 Internal Only: HIGH - Industrial networks often have flat architectures, allowing internal attackers or compromised devices to exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to call commands on the Tbase server, suggesting some level of access is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: R 4.2-07 and later

Vendor Advisory: https://www.br-automation.com/downloads_br_productcatalogue/assets/1674823095245-en-original-1.0.pdf

Restart Required: Yes

Instructions:

1. Download APROL version R 4.2-07 or later from B&R Automation website. 2. Backup current configuration and data. 3. Install the update following vendor documentation. 4. Restart the APROL system to apply changes.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate APROL systems from general corporate networks and restrict access to Tbase server ports.

Access Control Restrictions

all

Implement strict access controls limiting who can interact with the Tbase server interface.

🧯 If You Can't Patch

  • Implement network segmentation to isolate APROL systems from untrusted networks
  • Apply strict access controls and monitor for unauthorized Tbase server access attempts

🔍 How to Verify

Check if Vulnerable:

Check APROL system version via the system interface or configuration files. If version is below R 4.2-07, the system is vulnerable.

Check Version:

Check APROL system documentation for version checking procedure specific to your installation.

Verify Fix Applied:

Verify APROL version is R 4.2-07 or higher after applying the update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Tbase server command sequences
  • Multiple failed command attempts
  • Tbase server restart events

Network Indicators:

  • Unusual traffic patterns to Tbase server ports
  • Multiple connection attempts to Tbase service

SIEM Query:

source="aprol_logs" AND (event_type="tbase_error" OR event_type="service_restart")

🔗 References

📤 Share & Export