Thursday, May 8, 2025
Homecyber securitySCADA Vulnerabilities Allow Attackers to Cause DoS and Gain Elevated Privileges

SCADA Vulnerabilities Allow Attackers to Cause DoS and Gain Elevated Privileges

Published on

SIEM as a Service

Follow Us on Google News

A recent security assessment by Palo Alto Networks’ Unit 42 has uncovered multiple vulnerabilities in the ICONICS Suite, a widely used Supervisory Control and Data Acquisition (SCADA) system.

These vulnerabilities, identified in versions 10.97.2 and earlier for Microsoft Windows, pose significant risks to critical infrastructure sectors such as government, military, manufacturing, water and wastewater, and utilities & energy.

The vulnerabilities include DLL hijacking, incorrect default permissions, uncontrolled search path elements, and dead code issues, which can lead to denial-of-service (DoS) conditions, privilege escalation, and even full system compromise.

- Advertisement - Google News
SCADA Vulnerabilities
Welcome page for an ICONICS Suite version 10.97.2 installation.

Impact of Vulnerabilities

The identified vulnerabilities allow attackers to exploit weaknesses in the ICONICS Suite, particularly through DLL hijacking and incorrect default permissions.

For instance, the DLL hijacking vulnerability (CVE-2024-1182) in the Memory Master Configuration (MMCFG) can lead to elevation of privileges.

This occurs when an attacker places a malicious DLL in a directory where the system will load it, enabling arbitrary code execution and system integrity compromise.

SCADA Vulnerabilities
Windows DLL search order.

Additionally, the incorrect default permissions vulnerability (CVE-2024-7587) in GenBroker32 allows authenticated attackers to disclose or tamper with confidential information, causing a DoS condition.

This vulnerability arises when overly permissive settings grant system-wide user access to critical directories.

The vulnerabilities also include uncontrolled search path elements (CVE-2024-8299 and CVE-2024-9852), which enable local authenticated attackers to execute malicious code by storing specially crafted DLLs in specific folders.

These vulnerabilities can lead to privilege escalation and arbitrary code execution.

Furthermore, the dead code vulnerability (CVE-2024-8300) allows attackers to execute malicious code by tampering with specially crafted DLLs.

Mitigation and Response

To address these vulnerabilities, ICONICS released security patches and advisories in 2024.

Users are advised to update their systems to the latest versions and apply the recommended workarounds.

Palo Alto Networks’ security solutions, such as Cortex XDR and XSIAM, can detect known and novel DLL hijacking attacks, while Cortex Cloud helps identify malware using DLL hijacking techniques.

For those concerned about potential compromises, contacting the Unit 42 Incident Response team is recommended.

The exposure of several dozen ICONICS servers to the internet further underscores the urgency of implementing these security measures to protect against external threats.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...

Seamless AI Communication: Microsoft Azure Adopts Google’s A2A Protocol

Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...