

BACKGROUNDĬatapult Software is based in New Zealand and specializes in SCADA/HMI software development. NCCIC/ICS-CERT recommends that organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation. Impact to individual organizations depends on many factors that are unique to each organization. The device must be shut down and restarted to recover from the DoS.
Evaluate catapult serial#
If the device is connected via a serial connection, the same attack can be accomplished with physical access to the outstation. The use of this driver can cause the human-machine interface (HMI) to be put into a denial‑of‑service (DoS) condition by sending a specially crafted transmission control protocol (TCP) packet from the outstation on an IP-based network. Proficy human-machine interface/supervisory control and data acquisition (HMI/SCADA) – iFIX or CIMPLICITY servers with the vulnerable I/O Driver installed (this includes iFIX or CIMPLICITY installations that are part of Proficy Process Systems).

