Severity: Unknown
Description: An Inclusion of Functionality from Untrusted Control Sphere vulnerability in the SSH server on B&R APROL <4.4-00P1 may allow an authenticated local attacker from a trusted remote server to execute malicious commands.
CVSS Score: N/A
D
No data available.
No data available.
1. Risk Assessment
The vulnerability CVE-2024-45482 is an “Inclusion of Functionality from Untrusted Control Sphere” vulnerability affecting the SSH server within B&R APROL versions prior to 4.4-00P1. This means an authenticated local attacker, operating from a trusted remote server, can execute malicious commands. The CVSS v4.0 base score is 8.5 (High Severity), indicating a significant risk. The vulnerability’s attack complexity is low, and requires only low privileges to exploit. This suggests it’s relatively easy to exploit. The vulnerability impacts Integrity and Availability with a high degree. The business impact could be substantial, as B&R APROL is often used in industrial automation environments, potentially leading to process disruption, data corruption, or even physical impacts depending on what the APROL system controls. The likelihood of exploitation is moderate, as it requires an authenticated local attacker with access to a trusted remote server, but the impact if exploited is high, making this a significant risk to organizations using B&R APROL.
2. Potential Attack Scenarios
An attacker with legitimate SSH access to a B&R APROL server (version < 4.4-00P1) can leverage this vulnerability to gain elevated privileges. The attacker, initially authenticated with low privileges, can utilize the “Inclusion of Functionality from Untrusted Control Sphere” to execute commands with higher privileges than normally allowed. The attack vector is the SSH connection. The attack process involves the attacker exploiting the vulnerability during a normal SSH session, potentially through a crafted command or utilizing a specific function call that allows them to execute commands as a more privileged user (perhaps even root). The potential outcome is full control of the APROL server, enabling the attacker to modify configurations, steal data, or disrupt the industrial process controlled by APROL. This could lead to production downtime, faulty product output, or even safety hazards depending on the specific application.
3. Mitigation Recommendations
The primary mitigation is to upgrade B&R APROL to version 4.4-00P1 or later. This patches the underlying vulnerability in the SSH server. Organizations should prioritize patching based on the criticality of the APROL system within their overall industrial control system (ICS) architecture. Implement strong authentication mechanisms for SSH access, including multi-factor authentication where possible, to reduce the attack surface. Regularly review SSH access logs for suspicious activity. Limit the privileges granted to SSH users to the minimum necessary for their roles. Monitor the APROL system for unexpected behavior following patching to confirm the fix is effective. Refer to the official B&R Automation advisory for detailed upgrade instructions and further information: https://www.br-automation.com/fileadmin/SA24P015-77573c08.pdf. Consider network segmentation to isolate the APROL system from other critical networks, limiting the potential blast radius of a successful attack.
4. Executive Summary
B&R APROL, a key component in many industrial automation systems, is vulnerable to a security flaw (CVE-2024-45482) that could allow an attacker to gain significant control of the system. An authenticated local attacker on a trusted remote server can execute malicious commands, potentially disrupting operations, corrupting data, or even causing physical impacts depending on the controlled process. The vulnerability is rated as High severity and is relatively easy to exploit. We recommend upgrading to B&R APROL version 4.4-00P1 or later as soon as possible. This upgrade will patch the vulnerability and protect your industrial processes from potential disruption. Prompt action is crucial to minimize the risk to production, data integrity, and overall operational efficiency. Ignoring this vulnerability could lead to significant business downtime and potential financial losses.