File tree Expand file tree Collapse file tree 1 file changed +6
-5
lines changed
modules/exploits/windows/scada Expand file tree Collapse file tree 1 file changed +6
-5
lines changed Original file line number Diff line number Diff line change @@ -16,11 +16,12 @@ def initialize(info = {})
16
16
'Name' => 'ABB MicroSCADA wserver.exe Remote Code Execution' ,
17
17
'Description' => %q{
18
18
This module exploits a remote stack buffer overflow vulnerability in ABB MicroSCADA. The
19
- vulnerability exists on the wserver.exe component, disabled by default but required when
20
- a project uses the SCIL function WORKSTATION_CALL. The issue exists on the handling of
21
- EXECUTE operations, which allows unauthenticated execution of arbitrary commands. This
22
- module has been tested successfully on ABB MicroSCADA Pro SYS600 9.3 over Windows XP SP3
23
- and Windows 7 SP1.
19
+ issue is due to the handling of unauthenticated EXECUTE operations on the wserver.exe
20
+ component, which allows arbitrary commands. The component is disabled by default, but
21
+ required when a project uses the SCIL function WORKSTATION_CALL.
22
+
23
+ This module has been tested successfully on ABB MicroSCADA Pro SYS600 9.3 over
24
+ Windows XP SP3 and Windows 7 SP1.
24
25
} ,
25
26
'License' => MSF_LICENSE ,
26
27
'Author' =>
You can’t perform that action at this time.
0 commit comments