Tuesday, May 27, 2025
Homecyber securitySCADA Vulnerabilities Allow Attackers to Cause DoS and Gain Elevated Privileges

SCADA Vulnerabilities Allow Attackers to Cause DoS and Gain Elevated Privileges

Published on

SIEM as a Service

Follow Us on Google News

A recent security assessment by Palo Alto Networks’ Unit 42 has uncovered multiple vulnerabilities in the ICONICS Suite, a widely used Supervisory Control and Data Acquisition (SCADA) system.

These vulnerabilities, identified in versions 10.97.2 and earlier for Microsoft Windows, pose significant risks to critical infrastructure sectors such as government, military, manufacturing, water and wastewater, and utilities & energy.

The vulnerabilities include DLL hijacking, incorrect default permissions, uncontrolled search path elements, and dead code issues, which can lead to denial-of-service (DoS) conditions, privilege escalation, and even full system compromise.

- Advertisement - Google News
SCADA Vulnerabilities
Welcome page for an ICONICS Suite version 10.97.2 installation.

Impact of Vulnerabilities

The identified vulnerabilities allow attackers to exploit weaknesses in the ICONICS Suite, particularly through DLL hijacking and incorrect default permissions.

For instance, the DLL hijacking vulnerability (CVE-2024-1182) in the Memory Master Configuration (MMCFG) can lead to elevation of privileges.

This occurs when an attacker places a malicious DLL in a directory where the system will load it, enabling arbitrary code execution and system integrity compromise.

SCADA Vulnerabilities
Windows DLL search order.

Additionally, the incorrect default permissions vulnerability (CVE-2024-7587) in GenBroker32 allows authenticated attackers to disclose or tamper with confidential information, causing a DoS condition.

This vulnerability arises when overly permissive settings grant system-wide user access to critical directories.

The vulnerabilities also include uncontrolled search path elements (CVE-2024-8299 and CVE-2024-9852), which enable local authenticated attackers to execute malicious code by storing specially crafted DLLs in specific folders.

These vulnerabilities can lead to privilege escalation and arbitrary code execution.

Furthermore, the dead code vulnerability (CVE-2024-8300) allows attackers to execute malicious code by tampering with specially crafted DLLs.

Mitigation and Response

To address these vulnerabilities, ICONICS released security patches and advisories in 2024.

Users are advised to update their systems to the latest versions and apply the recommended workarounds.

Palo Alto Networks’ security solutions, such as Cortex XDR and XSIAM, can detect known and novel DLL hijacking attacks, while Cortex Cloud helps identify malware using DLL hijacking techniques.

For those concerned about potential compromises, contacting the Unit 42 Incident Response team is recommended.

The exposure of several dozen ICONICS servers to the internet further underscores the urgency of implementing these security measures to protect against external threats.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Threat Actors Use Fake DocuSign Notifications to Steal Corporate Data

DocuSign has emerged as a cornerstone for over 1.6 million customers worldwide, including 95%...

Government Calls on Organizations to Adopt SIEM and SOAR Solutions

In a landmark initiative, international cybersecurity agencies have released a comprehensive series of publications...

WordPress TI WooCommerce Wishlist Plugin Flaw Puts Over 100,000 Websites at Risk of Cyberattack

A severe security flaw has been identified in the TI WooCommerce Wishlist plugin, a...

Microsoft Alerts on Void Blizzard Hackers Targeting Telecommunications and IT Sectors

Microsoft Threat Intelligence Center (MSTIC) has issued a critical warning about a cluster of...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Use Fake DocuSign Notifications to Steal Corporate Data

DocuSign has emerged as a cornerstone for over 1.6 million customers worldwide, including 95%...

Government Calls on Organizations to Adopt SIEM and SOAR Solutions

In a landmark initiative, international cybersecurity agencies have released a comprehensive series of publications...

WordPress TI WooCommerce Wishlist Plugin Flaw Puts Over 100,000 Websites at Risk of Cyberattack

A severe security flaw has been identified in the TI WooCommerce Wishlist plugin, a...