Lucene search

K
certCERTVU:176301
HistoryOct 06, 2018 - 12:00 a.m.

Auto-Maskin DCU 210E RP 210E and Marine Pro Observer App

2018-10-0600:00:00
www.kb.cert.org
535

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

0.002 Low

EPSS

Percentile

56.6%

Overview

Auto-Maskin RP remote panels and DCU controls units are used to monitor and control ship engines. The units have several authentication and encryption vulnerabilities which can allow attackers to access the units and control connected engines.

Description

**CWE 798:**​Use of Hard-Coded Credentials - CVE–2018-5399

The DCU 210E firmware contains an undocumented Dropbear SSH server with a hardcoded username and password. The password is easily susceptible to cracking.

**CWE-346:**​Origin Validation Error - CVE–2018-5400
The Auto-Maskin products utilize an undocumented custom protocol to set up Modbus communications with other devices without validating those devices.

**CWE-319:**​ Cleartext Transmission of Sensitive Information - CVE–2018-5401
The devices transmit process control information via unencrypted Modbus communications.

**CWE-319:**​ Cleartext Transmission of Sensitive Information - CVE–2018-5402
The embedded webserver uses unencrypted plaintext for the transmission of the administrator PIN.


Impact

An attacker can exploit this vulnerability to observe information about configurations, settings, what sensors are present and in use, and other information. An attacker can send arbitrary ModBus (control) information to the engine control units.


Solution

CERT/CC is currently unaware of an update to address the vulnerabilities.


Critical control devices such as these should only be accessible via private, carefully secured networks.


Vendor Information

176301

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Auto-Maskin AS Affected

Updated: October 16, 2018

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

CVSS Metrics

Group Score Vector
Base 0 AV:–/AC:–/Au:–/C:–/I:–/A:–
Temporal 0 E:ND/RL:ND/RC:ND
Environmental 0 CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Brian Satira and Brian Olson for reporting this vulnerability.

This document was written by Dan Klinedinst.

Other Information

CVE IDs: [ CVE–2018-5399](<http://web.nvd.nist.gov/vuln/detail/ CVE–2018-5399>), CVE-2018-5400, CVE-2018-5401, CVE-2018-5402
Date Public: 2018-10-06 Date First Published:

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

0.002 Low

EPSS

Percentile

56.6%

Related for VU:176301