All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Russian firm ITDefense has reported multiple vulnerabilities in the Intellicom NetBiter® WebSCADA product.
According to IntelliCom, their NetBiter® products have been deployed in over 40 countries. The markets for NetBiter® solutions include industrial automation, power generation, energy management, building automation, and asset management.
The three issues identified by ITDefense all appear to be related to a directory traversal vulnerability that can be exploited through the WebSCADA embedded web server. If a user has been authenticated with “superadmin” privileges, (highest authentication level) they have permission to read system files by calling read.cgi with options to read a system file.
ICS-CERT is working with Intellicom to address these vulnerabilities. As an interim mitigation, Intellicom recommends customers change the default password when installing the product. In addition, they strongly advise customers to provide only the necessary privileges to non-administrator users of the product.
ICS-CERT will provide additional information as it becomes available.
Please report any issues affecting control systems in critical infrastructure environments to ICS-CERT.
ICS-CERT released the follow-up advisory, ICSA-10-316-01 - Intellicom NetBiter Vulnerabilities, on the ICS-CERT Web site on December 27, 2010.
For any questions related to this report, please contact the CISA at:
Toll Free: 1-888-282-0870
CISA continuously strives to improve its products and services. You can help by choosing one of the links below to provide feedback about this product.
Please share your thoughts.
We recently updated our anonymous product survey; we'd welcome your feedback.