Home -> Resources -> SCADA/ICS Vulnerability Reference -> Invensys Wonderware InBatch

Invensys Wonderware InBatch ActiveX Multiple Buffer Overflow Vulnerabilities

December 20, 2011 (Updated January 4, 2012)

Researcher Kuang-Chun Hung of the Security Research and Service Institute - Information and Communication Security Technology Center (ICST) has identified three vulnerabilities in the Invensys Wonderware InBatch application. These vulnerabilities exist in the GUIControls, BatchObjSrv, and BatchSecCtrl ActiveX Controls.

Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code within the context of an application (typically Internet Explorer) that uses the ActiveX control. Failed exploit attempts will result in a denial of service (DoS) on systems with affected versions of Wonderware InBatch Runtime Client components.

The following InBatch versions are affected:
- 8.1 SP1, 9.0, 9.0 SP1, 9.0 SP2, and 9.5 - InBatch Server and Runtime Clients

The affected components exist in a variety of Wonderware products including InTouch and Information Server browser clients that have downloaded converted windows that contain these controls.

According to Invensys, I/A Series Batch 8.1 SP1 and Wonderware InBatch 9.5 SP1 and higher are not affected by these vulnerabilities.

Invensys has issued software updates that resolve these vulnerabilities (see links below). The ICST has confirmed the software updates fully resolve the reported vulnerabilities.

ICS-CERT Advisories / Alerts

ICSA-11-332-01
ICSA-11-332-01P (released on Nov. 28, 2011 via US-CERT secure Portal)

Vendor Website (include Patches / Hotfixes)

Invensys Operations Management Home Page
Wonderware InBatch Software Product Info
Wonderware Cyber Security Updates (login required)
Global Client Support Foxboro Wonderware Security Releases Website (login required)
  [as of Dec. 21, this site did NOT contain information regarding this vulnerability]
Software Patch (login required)
Invensys Securing Industrial Control Systems Guide
Microsoft Support KB240797 - How to stop an ActiveX control from running in Internet Explorer

Exploit Proof-of-Concept

No public exploit is available at this time.

Common Vulnerability & Exposure (CVE) References

CVE-2011-4870
NVD CVE-2011-4870

Additional Information

Secunia Vulnerability Report and Statistics on InBatch 8.x
Secunia Vulnerability Report and Statistics on InBatch 8.x
Security Focus Vulnerability Info and Exploit Bugtraq ID 51129
How to Stop an ActiveX Control from Running in Internet Explorer - MS KB240797

Wonderware Vulnerabilities Patched (ISSSource)