WEG SuperDrive G2 v12.0.0 Insecure File Permissions

2016.01.17
Risk: Medium
Local: Yes
Remote: No
CVE: N/A
CWE: N/A

WEG SuperDrive G2 v12.0.0 Insecure File Permissions Vendor: WEG Group Product web page: http://www.weg.net Affected version: SuperDrive G2 (v12.0.0 Build 20150930-J1.8.0_60-NB8.0.2) SuperDrive (v7.0.0) Summary: SuperDrive is a Windows graph tool for parameter setting, control and monitor of WEG Drives. It permits to edit directly in the drive online parameters, or to edit offline parameter files stored in the microcomputer. It enables you to store parameters of all drives that exist in the installation. The software also incorporates functions enable the upload to the drive of the microcomputer parameters sets as well as the download from the drive to the microcomputer. The communication between drive and microcomputer is realized via RS232 serial interface (point to point) or by RS485 for network linkage. Desc: SuperDrive suffers from an elevation of privileges vulnerability which can be used by a simple authenticated user that can change the executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the 'C' flag (Change) for 'Authenticated Users' group. Tested on: Microsoft Windows 7 Ultimate SP1 (EN) Microsoft Windows 7 Professional SP1 (EN) Java 1.8.0_60 Vulnerability discovered by Gjoko 'LiquidWorm' Krstic @zeroscience Advisory ID: ZSL-2016-5294 Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5294.php 25.11.2015 -- C:WEGSuperDrive 7.0.0>cacls SuperDrive.exe C:WEGSuperDrive 7.0.0SuperDrive.exe BUILTINAdministrators:F NT AUTHORITYSYSTEM:F BUILTINUsers:R NT AUTHORITYAuthenticated Users:C C:WEGSuperDrive 7.0.0> C:WEGSuperDrive G2 12.0.0>cacls *.exe C:WEGSuperDrive G2 12.0.0SuperDriveG2.exe BUILTINAdministrators:F NT AUTHORITYSYSTEM:F BUILTINUsers:R NT AUTHORITYAuthenticated Users:C C:WEGSuperDrive G2 12.0.0unins000.exe BUILTINAdministrators:F NT AUTHORITYSYSTEM:F BUILTINUsers:R NT AUTHORITYAuthenticated Users:C C:WEGSuperDrive G2 12.0.0>

References:

http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5294.php


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top