CVE-2023-3242

8.6 HIGH

📋 TL;DR

An improper initialization vulnerability in the Portmapper component of B&R Industrial Automation Automation Runtime allows unauthenticated attackers to cause permanent denial-of-service conditions via network access. This affects industrial control systems running vulnerable versions, potentially disrupting critical automation processes.

💻 Affected Systems

Products:
  • B&R Industrial Automation Automation Runtime
Versions: All versions prior to G4.93
Operating Systems: Automation Runtime OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with Portmapper service enabled, which is typically part of standard configurations in industrial automation environments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Permanent denial-of-service rendering affected industrial automation systems inoperable, requiring physical replacement of hardware components and causing extended production downtime.

🟠

Likely Case

System crashes and service disruption requiring manual intervention and system restarts, impacting industrial operations and production lines.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing unauthenticated access to vulnerable systems.

🌐 Internet-Facing: HIGH - Unauthenticated network-based attack allows remote exploitation without credentials.
🏢 Internal Only: HIGH - Even internally, unauthenticated attackers on the same network segment can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability description indicates unauthenticated network-based exploitation is possible, suggesting relatively straightforward attack vectors.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: G4.93 or later

Vendor Advisory: https://www.br-automation.com/downloads_br_productcatalogue/assets/1689787619746-en-original-1.0.pdf

Restart Required: Yes

Instructions:

1. Download Automation Runtime G4.93 or later from B&R Industrial Automation. 2. Backup current system configuration. 3. Apply the update following vendor documentation. 4. Restart the system to complete installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected systems from untrusted networks using firewalls and VLANs to prevent unauthenticated access.

Disable Portmapper Service

all

If Portmapper functionality is not required, disable the service to eliminate the attack vector.

Consult B&R documentation for service disable procedures specific to your Automation Runtime version

🧯 If You Can't Patch

  • Implement strict network access controls allowing only trusted IP addresses to communicate with affected systems
  • Deploy intrusion detection systems to monitor for exploitation attempts and anomalous Portmapper traffic

🔍 How to Verify

Check if Vulnerable:

Check Automation Runtime version via system interface or diagnostic tools. If version is earlier than G4.93, system is vulnerable.

Check Version:

Use B&R Automation Studio or system diagnostic tools to check Automation Runtime version

Verify Fix Applied:

Verify system version shows G4.93 or later after applying the update and restarting.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Portmapper service crashes
  • System restart events without clear cause
  • Anomalous network connections to Portmapper port

Network Indicators:

  • Unusual traffic patterns to Portmapper service (typically port 111)
  • Multiple connection attempts from untrusted sources

SIEM Query:

source_port=111 AND (event_type="service_crash" OR event_type="system_restart")

🔗 References

📤 Share & Export