5.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:P/A:P
7.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
LOW
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L
0.001 Low
EPSS
Percentile
45.7%
**ATTENTION:**Remotely Exploitable/low skill level to exploit.
Vendor: Belden
Equipment: Hirschmann GECKO
--------- Begin Update A Part 1 of 5 --------
Vulnerabilities: Path Traversal, Server-Side Request Forgery, Cross-Site Request Forgery, Information Exposure
--------- End Update A Part 1 of 5 --------
This updated advisory is a follow-up to the original advisory titled ICSA-17-026-02 Belden Hirschmann GECKO that was published January 26, 2017, on the NCCIC/ICS-CERT web site.
The following GECKO switch versions are affected:
--------- Begin Update A Part 2 of 5 --------
Successful exploitation of these vulnerabilities may allow a remote attacker to access a copy of the configuration file of an affected device without authenticating, exposing sensitive information.
--------- End Update A Part 2 of 5 --------
--------- Begin Update A Part 3 of 5 --------
Belden has released a software version, Version 02.0.01, to address the identified vulnerabilities, which is available at the following location:
<https://www.e-catalog.beldensolutions.com/link/57078-24455-402707-402708/en/conf/0>
--------- End Update A Part 3 of 5 --------
Belden recommends that users update to the newest software version. As an interim compensating control, Belden specifies that users can reboot affected devices after each configuration download, preventing the vulnerable state.
--------- Begin Update A Part 4 of 5 --------
For additional information, please review Beldenβs security bulletins, BSECV-2016-5 and BSECV-2017-7, which are available at the following locations:
<https://www.belden.com/resourcecenter/security/upload/Belden-Security-Bulletin-BSECV-2016-5.pdf>
<http://www.belden.com/docs/upload/Belden_Security_Bulletin_BSECV_2017_7.pdf>
--------- End Update A Part 4 of 5 --------
NCCIC/ICS-CERT recommends that users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:
ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Additional mitigation guidance and recommended practices are publicly available in the ICSβCERT Technical Information Paper, ICS-TIP-12-146-01BβTargeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents.
No known public exploits specifically target these vulnerabilities. These vulnerabilities are remotely exploitable.
After an administrator downloads a configuration file, a copy of the configuration file, which includes hashes of user passwords, is saved to a location that is accessible without authentication.
CVE-2017-5163 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
--------- Begin Update A Part 5 of 5 --------
Web server receives a request, but does not sufficiently verify that the request is being sent to the expected destination.
CVE-2017-6036 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N ).
Web application does not sufficiently verify that requests were provided by user who submitted request.
CVE-2017-6038 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L).
Non-sensitive information can be obtained anonymously.
CVE-2017-6040 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
--------- End Update A Part 5 of 5 --------
Davy Douhine of RandoriSec identified these vulnerabilities.
Critical Infrastructure Sector(s): Multiple sectors
Countries Deployed: Worldwide
Company Headquarters Location: St. Louis, Missouri
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5163
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6036
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6038
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6040
www.belden.com/docs/upload/Belden_Security_Bulletin_BSECV_2017_7.pdf
cwe.mitre.org/data/definitions/200.html
cwe.mitre.org/data/definitions/22.html
cwe.mitre.org/data/definitions/352.html
cwe.mitre.org/data/definitions/918.html
public.govdelivery.com/accounts/USDHSCISA/subscriber/new?topic_id=USDHSCISA_138
twitter.com/CISAgov
twitter.com/intent/tweet?text=Belden%20Hirschmann%20GECKO%20%28Update%20A%29+https://www.cisa.gov/news-events/ics-advisories/icsa-17-026-02a
www.belden.com/resourcecenter/security/upload/Belden-Security-Bulletin-BSECV-2016-5.pdf
www.dhs.gov
www.dhs.gov/foia
www.dhs.gov/performance-financial-reports
www.e-catalog.beldensolutions.com/link/57078-24455-402707-402708/en/conf/0
www.facebook.com/CISA
www.facebook.com/sharer/sharer.php?u=https://www.cisa.gov/news-events/ics-advisories/icsa-17-026-02a&title=Belden%20Hirschmann%20GECKO%20%28Update%20A%29
www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L
www.instagram.com/cisagov
www.linkedin.com/company/cybersecurity-and-infrastructure-security-agency
www.linkedin.com/sharing/share-offsite/?url=https://www.cisa.gov/news-events/ics-advisories/icsa-17-026-02a
www.oig.dhs.gov/
www.surveymonkey.com/r/CISA-cyber-survey?product=https://www.cisa.gov/news-events/ics-advisories/icsa-17-026-02a
www.usa.gov/
www.whitehouse.gov/
www.youtube.com/@cisagov
mailto:?subject=Belden%20Hirschmann%20GECKO%20%28Update%20A%29&body=www.cisa.gov/news-events/ics-advisories/icsa-17-026-02a
5.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:P/A:P
7.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
LOW
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L
0.001 Low
EPSS
Percentile
45.7%