CVE-2022-47554

8.2 HIGH

📋 TL;DR

CVE-2022-47554 allows unauthenticated remote attackers to access sensitive XML files containing credentials and other critical information in ekorCCP and ekorRCI products. This affects Ormazabal electrical substation management systems. Attackers can exploit this without authentication to steal credentials and potentially compromise industrial control systems.

💻 Affected Systems

Products:
  • ekorCCP
  • ekorRCI
Versions: All versions prior to patched releases
Operating Systems: Windows-based industrial control systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Ormazabal electrical substation remote control and protection systems used in power distribution networks.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain administrative credentials, gain full control of electrical substation management systems, and potentially disrupt power distribution or cause physical damage.

🟠

Likely Case

Attackers steal credentials and sensitive configuration data, enabling further attacks on the industrial control network.

🟢

If Mitigated

With proper network segmentation and access controls, attackers can only access isolated systems without reaching critical infrastructure.

🌐 Internet-Facing: HIGH - The vulnerability allows unauthenticated remote access to sensitive files, making internet-exposed systems extremely vulnerable.
🏢 Internal Only: HIGH - Even internally, unauthenticated access to credential files poses significant risk to the entire network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple directory traversal or direct file access to XML files containing credentials and configuration data.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Contact Ormazabal for specific patched versions

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-ormazabal-products

Restart Required: Yes

Instructions:

1. Contact Ormazabal for security patches. 2. Apply patches following vendor instructions. 3. Restart affected systems. 4. Verify XML files are no longer accessible without authentication.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected systems from untrusted networks using firewalls and VLANs

Access Control Lists

all

Implement strict IP-based access controls to limit who can reach the web interfaces

🧯 If You Can't Patch

  • Implement network segmentation to isolate affected systems from untrusted networks
  • Deploy web application firewalls to block unauthorized access to XML files

🔍 How to Verify

Check if Vulnerable:

Attempt to access XML files via web interface without authentication using tools like curl: curl -v http://target/path/to/sensitive.xml

Check Version:

Check system documentation or contact Ormazabal for version information

Verify Fix Applied:

Verify XML files containing credentials are no longer accessible without proper authentication

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access attempts to XML files
  • Multiple failed authentication attempts followed by XML file access

Network Indicators:

  • Unusual HTTP GET requests for .xml files from external IPs
  • Traffic patterns showing directory traversal attempts

SIEM Query:

source="web_server" AND (uri="*.xml" OR uri CONTAINS ".xml") AND status="200" AND auth="none"

🔗 References

📤 Share & Export