Advisory Details

June 30th, 2020

(Pwn2Own) ICONICS Genesis64 IcoFwxServer Deserialization Of Untrusted Data Remote Code Execution Vulnerability

ZDI-20-780
ZDI-CAN-10297

CVE ID CVE-2020-12015
CVSS SCORE 9.8, AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS ICONICS
AFFECTED PRODUCTS Genesis64
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on affected installations of ICONICS Genesis64. Authentication is not required to exploit this vulnerability.

The specific flaw exists with the handling of serialized objects. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.

ADDITIONAL DETAILS ICONICS has issued an update to correct this vulnerability. More details can be found at:
https://www.us-cert.gov/ics/advisories/icsa-20-170-03
DISCLOSURE TIMELINE
  • 2020-01-30 - Vulnerability reported to vendor
  • 2020-06-30 - Coordinated public release of advisory
CREDIT Chris Anastasio (muffin) and Steven Seeley (mr_me) of Incite Team
BACK TO ADVISORIES