Vulnerability & Exploit Database

Back to search

ABB MicroSCADA wserver.exe Remote Code Execution

This module exploits a remote stack buffer overflow vulnerability in ABB MicroSCADA. The issue is due to the handling of unauthenticated EXECUTE operations on the wserver.exe component, which allows arbitrary commands. The component is disabled by default, but required when a project uses the SCIL function WORKSTATION_CALL. This module has been tested successfully on ABB MicroSCADA Pro SYS600 9.3 on Windows XP SP3 and Windows 7 SP1.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

exploit/windows/scada/abb_wserver_exec

Authors

  • Brian Gorenc
  • juan vazquez <juan.vazquez [at] metasploit.com>

References

Targets

  • ABB MicroSCADA Pro SYS600 9.3

Platforms

  • windows

Architectures

  • x86

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/scada/abb_wserver_exec msf exploit(abb_wserver_exec) > show targets ...targets... msf exploit(abb_wserver_exec) > set TARGET <target-id> msf exploit(abb_wserver_exec) > show options ...show and set options... msf exploit(abb_wserver_exec) > exploit