CVE-2023-35189

10.0 CRITICAL

📋 TL;DR

CVE-2023-35189 is a critical remote code execution vulnerability in Iagona ScrutisWeb versions 2.1.37 and earlier. Unauthenticated attackers can upload malicious payloads and execute arbitrary code on affected systems. Organizations using vulnerable versions of this industrial control system software are at immediate risk.

💻 Affected Systems

Products:
  • Iagona ScrutisWeb
Versions: 2.1.37 and earlier
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments with vulnerable versions regardless of configuration. Industrial control systems using this software are particularly at risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands, install malware, pivot to internal networks, disrupt industrial operations, and potentially cause physical damage.

🟠

Likely Case

Attackers gain initial foothold, deploy ransomware or cryptocurrency miners, steal sensitive industrial data, and maintain persistent access for further attacks.

🟢

If Mitigated

Attack attempts are blocked at network perimeter, detected by security controls, and logged for investigation with minimal operational impact.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward with publicly available proof-of-concept code. CISA has confirmed active exploitation in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.38 or later

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-23-199-03

Restart Required: Yes

Instructions:

1. Contact Iagona for updated version 2.1.38 or later. 2. Backup current configuration and data. 3. Install the update following vendor instructions. 4. Restart the ScrutisWeb service. 5. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate ScrutisWeb systems from untrusted networks and internet access

Web Application Firewall

all

Deploy WAF with rules to block malicious file uploads and RCE attempts

🧯 If You Can't Patch

  • Immediately disconnect vulnerable systems from internet and untrusted networks
  • Implement strict network access controls allowing only necessary connections from trusted sources

🔍 How to Verify

Check if Vulnerable:

Check ScrutisWeb version in administration interface or configuration files. If version is 2.1.37 or earlier, system is vulnerable.

Check Version:

Check web interface at /admin or examine application configuration files for version information

Verify Fix Applied:

Verify version is 2.1.38 or later in administration interface. Test file upload functionality with safe test files.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to ScrutisWeb
  • Suspicious process execution from web server context
  • Failed authentication attempts followed by successful file uploads

Network Indicators:

  • HTTP POST requests with unusual file extensions to ScrutisWeb endpoints
  • Outbound connections from ScrutisWeb server to unknown external IPs

SIEM Query:

source="scrutisweb" AND (event="file_upload" OR event="command_execution")

🔗 References

📤 Share & Export