CVE-2024-27769

8.8 HIGH

📋 TL;DR

CVE-2024-27769 is an information disclosure vulnerability in Unitronics Unistream Unilogic software that exposes sensitive information, potentially allowing attackers to take ownership of industrial control devices. This affects all versions prior to 1.35.227. Organizations using Unitronics Unistream devices for industrial automation are at risk.

💻 Affected Systems

Products:
  • Unitronics Unistream Unilogic
Versions: All versions prior to 1.35.227
Operating Systems: Windows (for Unilogic software)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Unilogic programming software used to configure Unistream PLCs and HMIs. The vulnerability exists in the software itself, not necessarily requiring the devices to be internet-facing.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain complete control over industrial devices, potentially disrupting critical operations, manipulating industrial processes, or causing physical damage to equipment.

🟠

Likely Case

Unauthorized actors access sensitive device information and take ownership of devices, enabling them to modify configurations, disrupt operations, or use devices as footholds for further attacks.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to isolated network segments, preventing lateral movement to critical systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Based on CWE-200 and CVSS 8.8 score, exploitation is likely straightforward once the vulnerability details are understood. No public exploit code has been confirmed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.35.227

Vendor Advisory: https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0

Restart Required: Yes

Instructions:

1. Download Unilogic version 1.35.227 or later from Unitronics website. 2. Install the update on all systems running Unilogic software. 3. Restart the Unilogic application. 4. Verify the version number in Help > About.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Unilogic software and Unistream devices from untrusted networks and the internet.

Access Control Restrictions

all

Implement strict access controls to limit who can access Unilogic software and connected devices.

🧯 If You Can't Patch

  • Segment the network to isolate Unilogic systems and Unistream devices from critical infrastructure and internet access.
  • Implement strict firewall rules to only allow necessary communications to/from Unilogic systems and monitor for unauthorized access attempts.

🔍 How to Verify

Check if Vulnerable:

Check the Unilogic software version by opening the application and navigating to Help > About. If version is below 1.35.227, the system is vulnerable.

Check Version:

In Unilogic: Help > About displays version information

Verify Fix Applied:

After updating, verify the version shows 1.35.227 or higher in Help > About. Test that sensitive information is no longer exposed by attempting to access device configuration data without proper authentication.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to Unilogic software
  • Unexpected device ownership changes
  • Unusual network traffic to/from Unistream devices

Network Indicators:

  • Unusual connections to Unilogic ports (typically TCP 20256)
  • Traffic patterns indicating device configuration changes from unauthorized sources

SIEM Query:

source="unilogic.log" AND (event_type="access_denied" OR event_type="configuration_change")

🔗 References

📤 Share & Export