ICS-CERT: Invensys Wonderware InBatch ActiveX Vulnerabilities

Friday, January 06, 2012



ICS-CERT originally released advisory “ICSA-11-332-01P—Invensys Wonderware InBatch ActiveX Vulnerabilities” in the US-CERT secure portal on November 28, 2011. This web page release was delayed to allow users time to download and install the update.

Researcher Kuang-Chun Hung of the Security Research and Service Institute−Information and Communication Security Technology Center (ICST) has identified three vulnerabilities in Invensys Wonderware InBatch. These vulnerabilities exist in the GUIControls, BatchObjSrv, and BatchSecCtrl ActiveX controls.

Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code or cause a denial of service (DoS) on systems with affected versions of Wonderware InBatch Runtime Client components.

ICS-CERT has coordinated the report with the ICST and Invensys. Invensys has issued software updates that resolve these vulnerabilities. The ICST has confirmed the software updates fully resolve the reported vulnerabilities.

The following Invensys Wonderware InBatch versions are affected:

  • 8.1 SP1, 9.0 SP2, and 9.5 InBatch Server and Runtime Clients
  • 9.0 and 9.0 SP1

The affected components exist in a variety of Wonderware products including InTouch and Information Server browser clients that have downloaded converted windows that contain these controls.

According to Invensys, I/A Series Batch 8.1 SP1 and Wonderware InBatch 9.5 SP1 and higher are not affected by these vulnerabilities.

If successfully exploited, these vulnerabilities could allow an attacker to execute arbitrary code on systems running affected versions of the product.

Impact to individual organizations depends on many factors that are unique to each organization. ICS-CERT recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation.


Invensys Wonderware InBatch is used in many industries worldwide including manufacturing, energy, food and beverage, chemical, and water and wastewater.
The InBatch Runtime Client provides an interface to the batch management system to allow operator interaction during the batch execution.


Affected versions of the InBatch Runtime Client components contain three buffer overflow --------- Begin Update A Part 1 of 1 -------- vulnerabilities. These vulnerabilities could be exploited by using long string values for the properties/methods of the referenced controls. This could result in either a DoS or remote code execution running with privileges of the logged-in user.

CVE-2011-4870c has been assigned to this vulnerability. Invensys has assessed the vulnerabilities using the CVSSdhere Version 2.0 calculator and gives the Overall CVSS = 6.0. Click to review the assessment. --------- End Update A Part 1 of 1 ----------


This vulnerability is remotely exploitable. This exploit may require social engineering. No publicly known exploits specifically target these vulnerabilities.


An attacker with a low skill level can create the DoS; a more skilled attacker could exploit the vulnerability to execute arbitrary code.


Invensys has developed software updates to address the reported vulnerabilities. Invensys recommends that customers who are running vulnerable versions of Wonderware InBatch update their systems to either InBatch 9.0 SP2 or 9.5 on all nodes that have the InBatch client runtime and the InBatch Server installed. Installation does not require a reboot.

Customers can download updates from the “Software Download” section of the Invensys Customer First Support website:

Follow the instructions in the ReadMe section for the product and component to install the software update.

In addition to applying the software updates, Invensys has made additional recommendations to customers running vulnerable versions of the Invensys Wonderware InBatch product:

  • Set the security level settings for the Internet browser to Medium−High to minimize the risk of a vulnerability exploit.
  • Reference the Invensys Securing Industrial Control Systems Guide for additional information on securing industrial control systems operating in a Microsoft Windows environment.

To access information related to Invensys security updates, customers can logon to the Cyber Security Updates website and the GCS Foxboro Wonderware Security Releases webpage:

Source:  http://www.us-cert.gov/control_systems/pdf/ICSA-11-332-01A.pdf

Possibly Related Articles:
Patching SCADA Vulnerabilities Headlines Mitigation Advisory ICS Active X ICS-CERT Industrial Control Systems Invensys Wonderware InBatch
Post Rating I Like this!
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.