Severity: CRITICAL
Description: Control By Web X-600M devices run Lua scripts and are vulnerable to code injection, which could allow an attacker to remotely execute arbitrary code.
CVSS Score: 9.1
B
No data available.
No data available.
1. Risk Assessment
The vulnerability CVE-2023-23551 affects Control By Web X-600M devices, allowing for remote code execution via Lua script code injection. This is a critical vulnerability, evidenced by a CVSS score of 9.1. The vulnerability’s impact is high across all three core security pillars – confidentiality, integrity, and availability. Successful exploitation could lead to full compromise of the device, potentially impacting the broader industrial control system (ICS) environment the X-600M is integrated into. The attack vector is network-based, meaning an attacker can exploit the vulnerability remotely, increasing the likelihood of exploitation. Privileges are required, however, a successful attacker with appropriate credentials or the ability to escalate privileges can execute arbitrary code. The likelihood of exploitation is considered moderate to high, particularly in environments with external network exposure or less stringent access controls. Business impact could range from disruption of operations to potential data exfiltration or even manipulation of controlled processes depending on the function of the X-600M device within the ICS. The EPSS score of 0.007070000 suggests a relatively low, but still present, probability of exploitation given the overall threat landscape.
2. Potential Attack Scenarios
An attacker could exploit CVE-2023-23551 by injecting malicious Lua code into a vulnerable X-600M device through a network connection. Let's consider a scenario where the X-600M is used to control a critical temperature sensor in a manufacturing process. The attacker, having identified a point of entry for Lua script input (potentially through a web interface or API), crafts a malicious Lua script that, when executed, establishes a reverse shell connection back to the attacker’s machine. This allows the attacker to gain full control over the X-600M device. From there, the attacker can manipulate the temperature sensor readings, potentially causing the manufacturing process to operate outside of optimal parameters, leading to product defects or even equipment damage. The attacker could also leverage the compromised X-600M as a pivot point to access other systems on the network, expanding the scope of the attack. The attacker could also leverage this vulnerability to install ransomware, crippling operations until a ransom is paid.
3. Mitigation Recommendations
The primary mitigation for CVE-2023-23551 is to update the firmware of affected X-600M devices to version 1.16.00 or later. Control By Web has released a firmware update addressing the vulnerability. Organizations should prioritize patching based on the criticality of the X-600M device’s role within their ICS environment. Additional mitigation steps include: implementing strong authentication and access control for the X-600M devices, limiting network exposure by segmenting the ICS network and restricting access to only necessary ports and protocols, and regularly monitoring X-600M devices for unusual activity. Consider implementing a web application firewall (WAF) in front of the X-600M’s web interface to filter potentially malicious Lua code. Further resources and details can be found at: https://www.cisa.gov/uscert/ics/advisories/icsa-23-040-01 and https://www.controlbyweb.com/firmware/X600M_FieldUpdate_V1.16.00.zip.
4. Executive Summary
Control By Web X-600M devices are vulnerable to a critical code injection flaw (CVE-2023-23551) that could allow attackers to remotely execute arbitrary code. This means attackers could potentially take full control of the device, disrupt operations, steal data, or manipulate critical processes. The vulnerability is readily exploitable over the network and carries a high impact to confidentiality, integrity, and availability. We recommend immediately updating the firmware of all affected X-600M devices to version 1.16.00 or later. This vulnerability is especially important to address for organizations relying on the X-600M for critical control system functions. Prompt action is crucial to minimize the risk of disruption and maintain the integrity of your operations. Failure to patch could lead to significant financial and operational impact.