CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:A/AC:L/Au:S/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
0.4%
Independent security researcher Justin W. Clarke of Cylance Inc. has identified a privilege-escalation vulnerability in the GarrettCom Magnum MNS-6K Management Software application via the use of a hard-coded password. This vulnerability could allow a remote attacker with any level of access to the system to escalate the attackerβs privilege to the administrative level. The attacker must have access to a logon account on the device to exploit this vulnerability.
GarrettCom has produced a patch that mitigates this vulnerability.
The following GarrettCom products are affected:
Successful exploitation of this vulnerability from an established account on the system could allow escalation of privileges to full administrative access. The privilege escalation could provide the attacker a vector for making changes to settings, or initiating a complete device shutdown causing a denial of service (DoS).
Impact to individual organizations depends on many factors that are unique to each organization. ICS-CERT recommends that organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation.
GarrettCom is a US-based company that maintains offices in the US and Europe. The Magnum MNS-6K Management Software provides device management for the Magnum 6K line of managed Ethernet switches.
Resellers also offer GarrettCom products in South America, China, India, and the Middle East, however, GarrettCom estimates that the affected products are deployed primarily in the United States with a small percentage in Europe and Asia. According to GarrettCom, the 6K line of switches are deployed across several U.S. critical infrastructure sectors including critical manufacturing, defense industrial base, energy, water, and transportation.
The Magnum MNS-6K Management Software uses an undocumented hard-coded password that could allow an attacker with access to an established device account to escalate privileges to the administrative or full-access level. While an attacker must use an established account on the device under attack, this vulnerability facilitates the circumvention of physical-connect safeguards and could allow complete administrative level access to the system, compromising system confidentiality, integrity, and availability.
[CVE-2012-3014 ](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3014 , NIST uses this advisory to create the CVE Web site>)has been assigned to this vulnerability. A CVSS v2 base score of 7.7 has been assigned; the CVSS vector string is (AV:A/AC:L/Au:S/C:C/I:C/A:C).
An attacker with access to an established user account could remotely log into the affected system and elevate privileges to the administrative level, thereby circumventing the physical-connect safeguards in place for administrative functions.
No known public exploit targets this vulnerability.
An attacker with a low skill could exploit this vulnerability.
Despite this vulnerability not being documented in the May 18, 2012, release notes, GarrettCom has an updated software version that addresses this specific security vulnerability. Release notes and download information can be found at the following URLs:
<http://www.garrettcom.com/techsupport/6k_dl/6k440_rn.pdf>
<http://www.garrettcom.com/techsupport/sw_downloads_6k.htm>
ICS-CERT encourages asset owners to take additional defensive measures to protect against this and other cybersecurity risks.
The Control Systems Security Program (CSSP) also provides a section for control systems security recommended practices on the CSSP Web page. Several recommended practices are available for reading and download, including_ Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies_. ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to taking defensive measures.
Additional mitigation guidance and recommended practices are publicly available in the ICS-CERT Technical Information Paper, ICS-TIP-12-146-01AβCyber Intrusion Mitigation Strategies.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents.
nvd.nist.gov/cvss.cfm?version=2&vector=(AV:A/AC:L/Au:S/C:C/I:C/A:C)
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3014 , NIST uses this advisory to create the CVE Web site
www.garrettcom.com/techsupport/6k_dl/6k440_rn.pdf
www.garrettcom.com/techsupport/sw_downloads_6k.htm
cisasurvey.gov1.qualtrics.com/jfe/form/SV_9n4TtB8uttUPaM6?product=https://www.cisa.gov/news-events/ics-advisories/icsa-12-243-01
public.govdelivery.com/accounts/USDHSCISA/subscriber/new?topic_id=USDHSCISA_138
twitter.com/CISAgov
twitter.com/intent/tweet?text=%20GarrettCom%20-%20Use%20of%20Hard-Coded%20Password+https://www.cisa.gov/news-events/ics-advisories/icsa-12-243-01
www.dhs.gov
www.dhs.gov/foia
www.dhs.gov/performance-financial-reports
www.facebook.com/CISA
www.facebook.com/sharer/sharer.php?u=https://www.cisa.gov/news-events/ics-advisories/icsa-12-243-01&title=%20GarrettCom%20-%20Use%20of%20Hard-Coded%20Password
www.instagram.com/cisagov
www.linkedin.com/company/cybersecurity-and-infrastructure-security-agency
www.linkedin.com/sharing/share-offsite/?url=https://www.cisa.gov/news-events/ics-advisories/icsa-12-243-01
www.oig.dhs.gov/
www.usa.gov/
www.whitehouse.gov/
www.youtube.com/@cisagov
mailto:?subject=%20GarrettCom%20-%20Use%20of%20Hard-Coded%20Password&body=www.cisa.gov/news-events/ics-advisories/icsa-12-243-01