CVE-2024-0323

9.8 CRITICAL

📋 TL;DR

The B&R Automation Runtime FTP server supports outdated encryption protocols (SSLv3, TLSv1.0, TLS1.1) that are vulnerable to cryptographic attacks. A network-based attacker can exploit these weak protocols to perform man-in-the-middle attacks and decrypt communications between affected clients. This affects systems using B&R Automation Runtime with the vulnerable FTP server configuration.

💻 Affected Systems

Products:
  • B&R Automation Runtime
Versions: All versions prior to the fix
Operating Systems: Industrial control system platforms running B&R Automation Runtime
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where the FTP server component is enabled and using the vulnerable encryption protocols.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of sensitive industrial automation data, including credentials, configuration files, and operational commands, potentially leading to production disruption or safety incidents.

🟠

Likely Case

Interception and decryption of FTP communications containing configuration data, firmware updates, or operational logs, enabling reconnaissance and potential further attacks.

🟢

If Mitigated

Limited impact if strong network segmentation and monitoring are in place, though weak encryption still presents a compliance and security hygiene issue.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the FTP server and leverages well-known cryptographic weaknesses in outdated protocols.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to vendor advisory for specific patched versions

Vendor Advisory: https://www.br-automation.com/fileadmin/SA23P004_FTP_uses_unsecure_encryption_mechanisms-f57c147c.pdf

Restart Required: Yes

Instructions:

1. Review vendor advisory SA23P004. 2. Apply the recommended update from B&R. 3. Restart affected systems. 4. Verify encryption protocols are updated to TLS 1.2 or higher.

🔧 Temporary Workarounds

Disable vulnerable encryption protocols

all

Configure FTP server to only use TLS 1.2 or higher, disabling SSLv3, TLS 1.0, and TLS 1.1.

Network segmentation

all

Isolate FTP server behind firewalls, restricting access to trusted networks only.

🧯 If You Can't Patch

  • Implement strict network access controls to limit FTP server exposure
  • Monitor for unusual FTP traffic patterns and failed connection attempts

🔍 How to Verify

Check if Vulnerable:

Use tools like Nmap with ssl-enum-ciphers script or OpenSSL s_client to test supported protocols on FTP port (typically 21 or 990).

Check Version:

Check B&R Automation Runtime version through system interface or configuration tools as specified in vendor documentation.

Verify Fix Applied:

Re-test with encryption protocol scanners to confirm only TLS 1.2+ is supported.

📡 Detection & Monitoring

Log Indicators:

  • Failed TLS handshakes
  • Connections using deprecated SSL/TLS versions
  • Unusual FTP authentication patterns

Network Indicators:

  • SSLv3/TLS1.0/TLS1.1 handshakes to FTP port
  • Man-in-the-middle attack patterns in network traffic

SIEM Query:

source="ftp_server" AND (tls_version="SSLv3" OR tls_version="TLSv1.0" OR tls_version="TLSv1.1")

🔗 References

📤 Share & Export