CVE-2023-28657
📋 TL;DR
An improper access control vulnerability in CONPROSYS HMI System (CHS) allows local users to escalate privileges to administrative level. This affects all versions prior to 3.5.3. Users with local access to the PC where CHS is installed can gain admin rights to view or modify product information.
💻 Affected Systems
- CONPROSYS HMI System (CHS)
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Local attacker gains full administrative control over the HMI system, potentially modifying critical industrial control configurations, stealing sensitive operational data, or disrupting industrial processes.
Likely Case
Authorized local users accidentally or intentionally escalate privileges to admin level, gaining unauthorized access to system settings and configuration data they shouldn't have.
If Mitigated
With proper network segmentation and access controls, impact is limited to the local system only, preventing lateral movement to other industrial control systems.
🎯 Exploit Status
Requires local access to the system but likely involves simple privilege escalation techniques once local access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.5.3
Vendor Advisory: https://www.contec.com/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_chs_230531_en.pdf
Restart Required: Yes
Instructions:
1. Download CHS version 3.5.3 from Contec support portal. 2. Backup current configuration and data. 3. Install the update following vendor instructions. 4. Restart the system. 5. Verify the update was successful.
🔧 Temporary Workarounds
Restrict Local Access
allLimit physical and remote access to HMI workstations to authorized personnel only
Implement Least Privilege
windowsConfigure Windows accounts with minimal necessary privileges and separate admin accounts
net localgroup "Remote Desktop Users" /add [username]
net localgroup "Administrators" /remove [username]
🧯 If You Can't Patch
- Implement strict physical security controls for HMI workstations
- Segment HMI network from corporate network and implement firewall rules
🔍 How to Verify
Check if Vulnerable:
Check CHS version in application settings or About dialog. If version is below 3.5.3, system is vulnerable.
Check Version:
Check CHS application menu → Help → About or view program properties
Verify Fix Applied:
Verify CHS version shows 3.5.3 or higher in application settings. Test that standard users cannot perform administrative functions.
📡 Detection & Monitoring
Log Indicators:
- Windows Event Logs showing privilege escalation attempts
- Unexpected administrative actions from non-admin accounts
- Account permission changes in security logs
Network Indicators:
- Unusual administrative access patterns to HMI system
- Lateral movement attempts from HMI workstation
SIEM Query:
EventID=4672 OR EventID=4688 | where SubjectUserName != "SYSTEM" AND PrivilegeList contains "SeDebugPrivilege" OR "SeTcbPrivilege"
🔗 References
- https://jvn.jp/en/vu/JVNVU93372935/
- https://www.contec.com/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_chs_230531_en.pdf
- https://www.contec.com/jp/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_chs_230531_jp.pdf
- https://jvn.jp/en/vu/JVNVU93372935/
- https://www.contec.com/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_chs_230531_en.pdf
- https://www.contec.com/jp/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_chs_230531_jp.pdf