CVE-2024-45969

7.5 HIGH

📋 TL;DR

A NULL pointer dereference vulnerability in MZ Automation's LibIEC61850 MMS Client allows a malicious MMS server to crash the client via a specially crafted InitiationResponse message, causing denial-of-service. This affects systems using vulnerable versions of the library for industrial communication protocols. Organizations using MZ Automation's IEC 61850 implementations in SCADA/energy systems are primarily impacted.

💻 Affected Systems

Products:
  • MZ Automation LibIEC61850
  • Products using LibIEC61850 library
Versions: All versions before commit 7afa40390b26ad1f4cf93deaa0052fe7e357ef33
Operating Systems: Linux, Windows, Embedded systems
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects MMS client implementations using the vulnerable library code. Server implementations are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Critical industrial control systems become unavailable, disrupting power grid operations or industrial processes with potential safety implications.

🟠

Likely Case

MMS client applications crash, disrupting communication between devices in industrial networks until manual restart.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to isolated network segments with quick detection and recovery.

🌐 Internet-Facing: LOW - Industrial control protocols like MMS are typically not exposed to the internet.
🏢 Internal Only: HIGH - Within industrial networks, malicious or compromised servers can exploit this against multiple clients.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the MMS client and ability to send crafted MMS messages. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Commit 7afa40390b26ad1f4cf93deaa0052fe7e357ef33 or later

Vendor Advisory: https://encs.eu/news/critical-security-vulnerabilities-discovered-in-mz-automations-mms-client/

Restart Required: Yes

Instructions:

1. Update LibIEC61850 to commit 7afa40390b26ad1f4cf93deaa0052fe7e357ef33 or later. 2. Recompile applications using the library. 3. Restart affected MMS client services.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate MMS traffic to trusted servers only using firewalls or network ACLs

MMS Server Whitelisting

all

Configure MMS clients to only accept connections from authorized servers

🧯 If You Can't Patch

  • Implement strict network segmentation to limit MMS traffic to trusted servers only
  • Deploy network monitoring to detect anomalous MMS traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check LibIEC61850 version or commit hash. If using source, verify code lacks the NULL pointer check in mmsClient_parseInitiateResponse()

Check Version:

For source builds: git log --oneline | head -1. For binaries: check with vendor documentation.

Verify Fix Applied:

Confirm LibIEC61850 is at commit 7afa40390b26ad1f4cf93deaa0052fe7e357ef33 or later, or verify NULL pointer check exists in mmsClient_parseInitiateResponse()

📡 Detection & Monitoring

Log Indicators:

  • MMS client crash logs
  • Unexpected process termination of MMS applications
  • Connection resets after InitiationResponse

Network Indicators:

  • MMS InitiationResponse messages from untrusted sources
  • Abnormal MMS packet patterns

SIEM Query:

Process termination events for MMS client applications OR network traffic containing MMS protocol with InitiationResponse messages

🔗 References

📤 Share & Export