Proficy Default Login Method Does Not Encrypt User Passwords
SecurityTracker Alert ID: 1019273|
SecurityTracker URL: http://securitytracker.com/id/1019273
(Links to External Site)
Date: Jan 26 2008
Disclosure of authentication information|
Fix Available: Yes Vendor Confirmed: Yes Exploit Included: Yes |
Version(s): 2.6, possibly prior versions|
A vulnerability was reported in Proficy. A remote user monitoring the network can obtain user authentication data.|
The system sends usernames and passwords in clear text (using the HTTP Basic authentication method). A remote user monitoring the network between the target user's browser and the target system can obtain user authentication data.
Eyal Udassin of C4 reported this vulnerability.
A remote user monitoring the network can obtain user authentication data.|
The vendor recommends using Windows-based authentication or SSL.|
The GE advisory is available at:
Vendor URL: support.gefanuc.com/support/index?page=kbchannel&id=KB12459 (Links to External Site)
Access control error|
Source Message Contents
Date: Fri, 25 Jan 2008 12:38:27 -0500|
Subject: C4 Security Advisory - GE Fanuc Proficy Information Portal 2.6 Authentication Vulnerability
GE-Fanuc's Proficy Information Portal 2.6 is a web based reporting
application for the SCADA environment. As such it will usually be installed
in a buffer zone between the SCADA and the corporate network, which makes it
a very sensitive application as it can access both networks.
The login process of Proficy involves sending the username in cleartext and
the password in Base64 encoded format. This transmition can potentially be
intercepted and decoded by an attacker with access to the data traffic.
An attacker can harvest user credentials by intercepting the traffic between
the browser and the Proficy server.
Proficy Information Portal 2.6
Previous versions may be vulnerable, as they were not tested.
The vendor issued a KB article on how to resolve this vulnerability at the
GE-Fanuc website, yet the proposed solution was not verified by C4.
For additional information please contact us at firstname.lastname@example.org. Note
that we will respond only to verified utility personnel and governmental
The CVE identifier assigned to this vulnerability by CERT is CVE-2008-0174
This vulnerability was discovered by Eyal Udassin of C4.
Eyal Udassin - C4 (Formerly Swift Coders)
33 Jabotinsky St. The Twin Towers #1, Ramat Gan, Israel
email@example.com / www.c4-security.com