December 22, 2015 By Douglas Bonderud 3 min read

Christmas is just around the corner, but for many IT security professionals, the holiday is a source of worry rather than wonder: Security vulnerabilities are often leveraged by cybercriminals determined to make the most of lower staffing levels and existing network issues. Topping this year’s Christmas hit list are three flaws that, if left unchecked, pose a serious risk for enterprises. Here’s a wrap-up.

PLC Problems

As noted by SecurityWeek, a host of vulnerabilities have been found in Schneider Electric’s Modicon M340 programmable logic controller (PLC) products, which are midrange devices popular in manufacturing, transportation, electrical equipment and water automation. Thirteen models are affected by CVE-2015-7937, a buffer overflow that occurs when a random password of 90 to 100 characters is entered into the PLC’s Web server access point. Since the password character buffer is capped at 65 characters using the strcpy() function, any overruns cause the device to crash.

CTO Nir Giller of security research firm CyberX, who is credited with discovering the vulnerability, said it may also be possible to construct a special password that could remotely execute code on the server. Schneider released firmware updates on Dec. 15 and plans to roll out another set on Jan. 16, but CyberX hasn’t confirmed whether the new firmware solves the problem. In the meantime, companies are advised to block port 80 with a firewall to minimize risk.

Impacted Industrial Routers

Next up are eWon industrial routers designed to securely connect industrial machines to the Internet; the devices are used in industries such as transportation, textiles, robotics, oil and gas, medical and renewable energy. According to ICS-CERT, independent security researcher Karn Ganeshen discovered the security vulnerabilities, which affect all eWon devices running firmware prior to version 10.1s0. The more worrisome issue — assigned a severity score of 9.9 by ICS-CERT — is CVE-2015-7926, which allows attackers using forged URLs to gather information about I/O servers, change server configuration or even delete users.

Cleartext passwords (CVE-2015-7928) are also a problem since they allow for a man-in-the-middle (MitM) attack to intercept this data, while some pages in the eWon Web app use an autocomplete feature that exposes passwords. There’s also a session management issue that allows sessions to remain active even after users log off: Only closing the browser will invalidate the session.

Security Vulnerabilities in Outlook Overlooked

The last big holiday security hole comes from Microsoft Outlook. As noted by Ars Technica, Microsoft patched the flaw (CVE-2015-6172) — known as BadWinmail — during its Dec. 8 Patch Tuesday, but details have now emerged about the real danger of this vulnerability. It goes like this: While Outlook is designed to prevent malicious attacks from files attached to seemingly benign emails using its Protected View sandbox, security researcher Haifei Li found a way to attach malware and sneak it past Microsoft’s security bouncers.

Using the Transport Neutral Encapsulation Format (TNEF) to attach a *.dat file, usually named winmail.dat, Li found it was possible to include an OLE object in the winmail.dat file that automatically loads when an email is opened. More worrisome? If this malicious email is the newest in a user’s inbox, the malware executes as soon as Outlook is launched.

What’s more, using TNEF makes it possible to deliver a malicious payload using the *.msg format, which is considered safe by Outlook. It’s no wonder, then, that the Ars Technica piece described BadWinmail as a letterbomb exploit, while Li called it “The Enterprise Killer.” While it should now be patched thanks to Microsoft, it’s worth keeping an eye on Outlook over the holiday season.

For many IT security professionals, the No. 1 goal is getting through New’s Years without experiencing a major breach or server crash. These three security vulnerabilities can put that plan in jeopardy, however. To avoid a less-than-happy holiday, make sure network security is wrapped up with firmware updates, firewall blocks and the latest Microsoft patch.

More from

Government cybersecurity in 2025: Former Principal Deputy National Cyber Director weighs in

4 min read - As 2024 comes to an end, it’s time to look ahead to the state of public cybersecurity in 2025.The good news is this: Cybersecurity will be an ongoing concern for the government regardless of the party in power, as many current cybersecurity initiatives are bipartisan. But what will government cybersecurity look like in 2025?Will the country be better off than they are today? What are the positive signs that could signal a good year for national cybersecurity? And what threats should…

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

2024 trends: Were they accurate?

4 min read - The new year always kicks off with a flood of prediction articles; then, 12 months later, our newsfeed is filled with wrap-up articles. But we are often left to wonder if experts got it right in January about how the year would unfold. As we close out 2024, let’s take a moment to go back and see if the crystal balls were working about how the year would play out in cybersecurity.Here are five trends that were often predicted for…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today