CVE-2023-29169

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated users to inject arbitrary operating system commands in mySCADA myPRO versions 8.26.0 and prior. Attackers with valid credentials can execute commands with the privileges of the myPRO application, potentially compromising the entire system. Industrial control systems using vulnerable mySCADA installations are affected.

💻 Affected Systems

Products:
  • mySCADA myPRO
Versions: 8.26.0 and prior
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the myPRO interface; default installations are vulnerable if accessible to authenticated users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands with application privileges, potentially leading to ransomware deployment, data theft, or disruption of industrial processes.

🟠

Likely Case

Authenticated attackers gaining shell access to the underlying operating system, enabling lateral movement, data exfiltration, or installation of persistent backdoors.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access, and command validation are implemented, restricting the blast radius.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but command injection is straightforward once authenticated; no public exploit code is known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.27.0 or later

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-23-096-06

Restart Required: Yes

Instructions:

1. Download mySCADA myPRO version 8.27.0 or later from the vendor. 2. Backup current configuration and data. 3. Install the updated version following vendor instructions. 4. Restart the myPRO service or system as required.

🔧 Temporary Workarounds

Restrict Network Access

all

Limit access to myPRO interface to trusted IP addresses only using firewall rules.

Implement Least Privilege

all

Reduce the number of authenticated users and ensure they have minimal necessary permissions.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate myPRO systems from critical networks.
  • Deploy application-level firewalls or WAFs with command injection detection rules.

🔍 How to Verify

Check if Vulnerable:

Check the myPRO version in the application interface or configuration files; versions 8.26.0 or earlier are vulnerable.

Check Version:

Check the application GUI or configuration files for version information; no universal CLI command exists.

Verify Fix Applied:

Verify the installed version is 8.27.0 or later and test command injection attempts to ensure they are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in myPRO logs
  • Failed authentication attempts followed by command injection attempts

Network Indicators:

  • Unexpected outbound connections from myPRO systems
  • Traffic patterns indicating command and control activity

SIEM Query:

source="myPRO" AND (event="command_execution" OR event="os_command")

🔗 References

📤 Share & Export