All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
ICS-CERT is aware of publicly released report that includes exploit code targeting a buffer overflow vulnerability in the ScadaTEC SCADAPhone& Modbus TagServer products. This vulnerability has yet to be confirmed by either ICS-CERT or by ScadaTEC.
According to this report, this vulnerability relies on the operator opening a specially crafted file with the application. Currently, the exploit code allows an attacker the ability to bind a shell. Simple modifications of this exploit code could result in additional impacts to systems running affected versions of the products.
ICS-CERT is coordinating with the vendor to identify mitigations.
Please report any issues affecting control systems in critical infrastructure environments to ICS-CERT.
The public report claims that two products are affected by the buffer overflow vulnerability: SCADAPhone and Modbus TagServer.
According to ScadaTEC, SCADAPhone is a notification application that alerts owners and operators of their SCADA system conditions and can also write values to the SCADA System.
The ScadaTEC Modbus TagServer is an OPC server that communicates directly with field devices and makes data available to OPC clients.
According to ScadaTEC, both products are used mostly in the Water sector but are also used in Critical Manufacturing and Chemical sector applications in the United States and Australia.
ICS-CERT published a follow-up advisory titled ICSA-11-362-01 - ScadaTEC ScadaPhone & Modbus TagServer Buffer Overflow on the ICS-CERT Web page on December 28, 2011.
For any questions related to this report, please contact the CISA at:
Toll Free: 1-888-282-0870
CISA continuously strives to improve its products and services. You can help by choosing one of the links below to provide feedback about this product.
Please share your thoughts.
We recently updated our anonymous product survey; we'd welcome your feedback.