Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»RCE, DoS Exploits Found in Rockwell PanelView Plus: Patch Now

    RCE, DoS Exploits Found in Rockwell PanelView Plus: Patch Now

    July 3, 2024

    Microsoft has discovered and disclosed two significant vulnerabilities in Rockwell Automation’s PanelView Plus devices. These vulnerabilities could be remotely exploited by unauthenticated attackers, enabling them to execute remote code and initiate denial-of-service (DoS) attacks.

    The Microsoft findings highlight severe security gaps in the industrial space, where these human-machine interface (HMI) graphic terminals are widely used. This discovery by Microsoft highlights the critical need for robust security measures in industrial automation systems to protect against potential disruptions.

    Technical Details of the RA PanelView Plus Devices Vulnerabilities

    The Remote Code Execution (RCE) vulnerability, identified as CVE-2023-2071 with a CVSS score of 9.8, involves the exploitation of two custom classes within the device. Attackers can abuse these classes to upload and execute a malicious DLL, effectively gaining remote control of the device.

    The DoS vulnerability, labeled CVE-2023-29464 with a CVSS score of 8.2, exploits the same custom class to send a crafted buffer that the device cannot handle, leading to a system crash.

    “The RCE vulnerability in PanelView Plus involves two custom classes that can be abused to upload and load a malicious DLL into the device. The DoS vulnerability takes advantage of the same custom class to send a crafted buffer that the device is unable to handle properly, thus leading to a DoS,” reads Microsoft Blog.

    Microsoft Discovery and Disclosure Process

    Microsoft’s Security Vulnerability Research (MSVR) team detected these vulnerabilities through diligent analysis and shared their findings with Rockwell Automation via Coordinated Vulnerability Disclosure (CVD) in May and July 2023. Rockwell Automation promptly responded, publishing advisories and releasing security patches in September and October 2023.

    “We shared these findings with Rockwell Automation through Coordinated Vulnerability Disclosure (CVD) via Microsoft Security Vulnerability Research (MSVR) in May and July 2023. Rockwell published two advisories and released security patches in September and October 2023,” reads Blog.

    PanelView Plus devices play a crucial role in industrial automation, making the discovered vulnerabilities particularly concerning. Exploiting these vulnerabilities could allow attackers to remotely execute code, potentially leading to operational disruptions and significant financial losses for affected organizations.

    Microsoft emphasizes the importance of applying the released security patches to mitigate these risks.

    Microsoft Defender for IoT Research Team’s Role

    One of the key responsibilities of the Microsoft Defender for IoT research team is to ensure comprehensive analysis of operational technology (OT) and Internet of Things (IoT) protocols.

    During their investigation, the team observed a legitimate packet capture between two devices communicating via the Common Industrial Protocol (CIP). A suspicious remote registry query involving a path to a registry value named “ProductCode” raised concerns about potential vulnerabilities.

    In-Depth Analysis of the Protocol

    CIP is an object-oriented protocol designed for industrial automation applications. Messages are directed towards specific objects identified by their Class ID and Object Instance ID. The protocol includes a Service Code, which denotes the action to be performed on the object.

    Microsoft’s analysis revealed that the communication observed involved vendor-specific Service ID and Class ID values, prompting further investigation into the HMI firmware.

    Firmware Analysis and Exploitation Approach

    PanelView Plus HMIs operate on the Windows 10 IoT (or older versions on Windows CE) operating system. Microsoft’s team extracted relevant DLLs and executables from the firmware to understand how the device processes CIP requests.

    They discovered that certain DLLs manage custom CIP classes responsible for reading and writing registry keys. This discovery led to the identification of two custom classes that could be exploited for remote code execution.

    Custom Classes and Exploitation

    The first custom class accepts a DLL path, function name, and parameter, loading the DLL and executing the specified function. Despite a verification function limiting the function names to predefined values, Microsoft found a way to exploit this class. The second custom class allows reading and writing files on the device, with less stringent verification, providing an avenue for uploading a malicious DLL.

    Microsoft demonstrated an exploitation approach by compiling a malicious DLL compatible with Windows 10 IoT. They used the second custom class to upload the DLL and placed it in a specific folder. The DLL, named remotehelper.dll, was then executed using the first custom class, granting attackers remote control of the device. This proof-of-concept confirmed the severity of the vulnerability and the potential for exploitation.

    Mitigation and Protection Measures

    To mitigate the risks associated with these vulnerabilities, Microsoft recommends the following measures:

    Apply Patches: Ensure that affected devices are updated with the latest security patches. Specifically, install patches PN1645 and PN1652 to address the identified vulnerabilities.
    Network Segmentation: Disconnect critical devices such as PLCs, routers, and PCs from the internet and ensure proper network segmentation.
    Access Control: Limit access to CIP devices to authorized components only.
    Utilize Tools: Use Microsoft’s tool for scanning and forensic investigation of Rockwell Rslogix devices, available on GitHub, to identify impacted devices and secure them accordingly.

    Microsoft’s findings and disclosure of these vulnerabilities highlight the importance of collaborative efforts in the cybersecurity community. By sharing detailed technical insights and mitigation strategies, Microsoft aims to strengthen the security posture of industrial automation systems.

    Source: Read More

    Hostinger
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleThe Tactics of ‘Supposed Grasshopper’: Malware Strikes Israeli Government and Companies
    Next Article FakeBat Loader Malware Spreads Widely Through Drive-by Download Attacks

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 17, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-48187 – RAGFlow Authentication Bypass

    May 17, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Rilasciata OpenMandriva Lx 6.0: Distribuzione Indipendente con KDE Plasma 6 e Server Edition

    Linux

    Easterly Calls for Resilience Against China as Biden Preps Cybersecurity Order

    Development

    How to change default save location for screenshots on Windows 11

    News & Updates

    Suggest Open source (life time free) Test Case management tool [closed]

    Development
    Hostinger

    Highlights

    I tried Google’s personalized Daily Listen AI podcast, and it was… interesting

    January 16, 2025

    Apparently I Google a lot of random things. 😆 Source: Latest news 

    Beyond the blue screen of death: Why software updates matter

    July 26, 2024

    Managing Top-Layer Elements and Display Behavior in CSS

    January 30, 2025

    Think DeepSeek has cut AI spending? Think again

    April 4, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.