Rapid7 Vulnerability & Exploit Database

7-Technologies IGSS 9 Data Server/Collector Packet Handling Vulnerabilities

Back to Search

7-Technologies IGSS 9 Data Server/Collector Packet Handling Vulnerabilities

Disclosed
03/24/2011
Created
05/30/2018

Description

This module exploits multiple vulnerabilities found on IGSS 9's Data Server and Data Collector services. The initial approach is first by transferring our binary with Write packets (opcode 0x0D) via port 12401 (igssdataserver.exe), and then send an EXE packet (opcode 0x0A) to port 12397 (dc.exe), which will cause dc.exe to run that payload with a CreateProcessA() function as a new thread.

Author(s)

  • Luigi Auriemma
  • sinn3r <sinn3r@metasploit.com>

Platform

Windows

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/scada/igss9_misc
msf exploit(igss9_misc) > show targets
    ...targets...
msf exploit(igss9_misc) > set TARGET < target-id >
msf exploit(igss9_misc) > show options
    ...show and set options...
msf exploit(igss9_misc) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;