TL;DR

['Bosch Rexroth IndraWorks is vulnerable to remote code execution due to a deserialization of untrusted data flaw.', 'Attackers require user interaction for exploitation but can execute arbitrary commands remotely once the vulnerability is leveraged.']

What happened

["A security researcher reported a critical RCE vulnerability affecting Bosch Rexroth's IndraWorks software.", 'The flaw resides in how IndraWorks handles print settings files, leading to deserialization of untrusted data scenarios.', 'Successful exploitation requires user interaction but can lead to remote code execution.']

Why it matters for ops

['Operators need to be aware that a specific file parsing flaw within the Bosch Rexroth IndraWorks software could allow unauthorized access and command execution on affected systems.', 'This highlights the importance of regular security updates and patches for all industrial control system components to mitigate such risks.']

Mitigation

  • Apply available security patches to mitigate the RCE vulnerability in IndraWorks.
  • Monitor system logs for unusual activities related to file parsing and deserialization operations.

Action items

  • Update IndraWorks software immediately with provided patches from Bosch Rexroth.
  • Implement strict access controls and logging on systems utilizing IndraWorks print settings files.
  • Educate employees about the risks of handling untrusted data in production environments.

Detection IOCs

  • Malicious print settings files attempting deserialization
  • Unusual network traffic from IndraWorks systems
  • Unexpected remote code execution signs

Source link

http://www.zerodayinitiative.com/advisories/ZDI-26-110/