• TwitterFacebookGoogle PlusLinkedInRSS FeedEmail

Progea Movicon Skype

4/21/2018 
Progea Movicon Skype

Big Combat Arms File. Racing Program San Lazaro here. Overview ICS-CERT has received a report from independent security researcher Jeremy Brown of a data leakage and denial-of-service vulnerability in Progea’s Movicon 11 human machine interface (HMI) product. Progea has verified the vulnerability and has developed a patch to address the issue. ICS-CERT has verified that the patch resolves the vulnerability.

Progea Inc

Advisory (ICSA-17-290-01) Progea Movicon SCADA/HMI Original release date: October 17, 2017. Malware researcher Dancho Danchev is reporting a widespread social engineering campaign on Skype that is spreading a variant of. Progea Movicon Memory Corruption. Movicon Pro.Lean; Connext; Progea Cloud – Databoom; Solutions. Software SCADA; Software HMI; GeoSCADA. Find out how the Progea software can improve your.

Affected Products This vulnerability affects versions of Movicon 11.2 prior to Build 1084. Impact Movicon 11.2 is used primarily in Italy with a small percentage of installations in other European countries. A successful exploit of this vulnerability could result in data leakage, data manipulation, or denial of service. The exact impact to individual organizations depends on many factors that are unique to each organization. ICS-CERT recommends that organizations evaluate the impact of this vulnerability based on their environment, architecture, and product implementation.

Background is a privately owned Italian company. Movicon 11 is a completely XML-based HMI development solution that includes drivers for all major Programmable Logic Controllers (PLCs). Movicon provides OPC-based connectivity for data transfer, including OPC DA and OPC XML DA services. Movicon is an XML-based HMI system that uses a web-enabled architecture based on JAVA. Vulnerability Characterization Vulnerability Overview A vulnerability in TCPUploadServer.exe allows a remote, unauthenticated host to execute functions on the server. Exploiting this vulnerability will allow an attacker to delete arbitrary files, execute a program with an arbitrary argument, crash the server, obtain information about specific aspects of the remote host, and more. An attacker can send a specially crafted packet to the server on Port 10651/TCP that can cause the system to respond with OS version and drive information.