diff --git a/modules/exploits/windows/scada/abb_wserver_exec.rb b/modules/exploits/windows/scada/abb_wserver_exec.rb index 66212e350b..11e7f5701a 100644 --- a/modules/exploits/windows/scada/abb_wserver_exec.rb +++ b/modules/exploits/windows/scada/abb_wserver_exec.rb @@ -16,11 +16,12 @@ class Metasploit3 < Msf::Exploit::Remote 'Name' => 'ABB MicroSCADA wserver.exe Remote Code Execution', 'Description' => %q{ This module exploits a remote stack buffer overflow vulnerability in ABB MicroSCADA. The - vulnerability exists on the wserver.exe component, disabled by default but required when - a project uses the SCIL function WORKSTATION_CALL. The issue exists on the handling of - EXECUTE operations, which allows unauthenticated execution of arbitrary commands. This - module has been tested successfully on ABB MicroSCADA Pro SYS600 9.3 over Windows XP SP3 - and Windows 7 SP1. + issue is due to the handling of unauthenticated EXECUTE operations on the wserver.exe + component, which allows arbitrary commands. The component is disabled by default, but + required when a project uses the SCIL function WORKSTATION_CALL. + + This module has been tested successfully on ABB MicroSCADA Pro SYS600 9.3 over + Windows XP SP3 and Windows 7 SP1. }, 'License' => MSF_LICENSE, 'Author' =>