CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS
Percentile
69.0%
**ATTENTION:**Remotely exploitable. Low skill level is needed to exploit.
Vendor: Red Lion Controls, AutomationDirect
Equipment: Sixnet-Managed Industrial Switches and STRIDE-Managed Ethernet Switches
Vulnerability: Use of Hard-coded Cryptographic Keys
The following Red Lion Controls Sixnet-Managed Industrial Switches are affected:
The following AutomationDirect STRIDE-Managed Ethernet Switch models, which are manufactured by Red Lion Controls, are affected:
Successful exploitation of the hard-coded cryptographic key vulnerabilities could result in loss of data confidentiality, integrity, and availability.
Red Lion Controls has released SLX firmware Version 5.3.174 to address the hard-coded cryptographic keys issue.
Red Lion Controls recommends updating to SLX firmware Version 5.3.174, found here:
<http://www.redlion.net/ethernet-switches-software-firmware>
Automation Direct recommends updating to Stride Managed Ethernet firmware Version 5.3.174, found here:
<http://support.automationdirect.com/firmware/binaries.html>
NCCIC/ICS-CERT recommends that users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:
ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Additional mitigation guidance and recommended practices are publicly available in the ICSβCERT Technical Information Paper, ICS-TIP-12-146-01BβTargeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents.
No known public exploits specifically target these vulnerabilities.
A hard-coded cryptographic key vulnerability was identified. Vulnerable versions of Stride-Managed Ethernet switches and Sixnet-Managed Industrial switches use hard-coded HTTP SSL/SSH keys for secure communication. Because these keys cannot be regenerated by users, all products use the same key. The attacker could disrupt communication or compromise the system.
CVE-2016-9335 has been assigned to this vulnerability. A CVSS v3 base score of 10 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
Mark Cross of RIoT Solutions identified these vulnerabilities.
Critical Infrastructure Sector: Critical Manufacturing
Countries/Areas Deployed: Deployed worldwide
Company Headquarters Location: United States
support.automationdirect.com/firmware/binaries.html
www.redlion.net/ethernet-switches-software-firmware
cisasurvey.gov1.qualtrics.com/jfe/form/SV_9n4TtB8uttUPaM6?product=https://www.cisa.gov/news-events/ics-advisories/icsa-17-054-02
cwe.mitre.org/data/definitions/321.html
public.govdelivery.com/accounts/USDHSCISA/subscriber/new?topic_id=USDHSCISA_138
twitter.com/CISAgov
twitter.com/intent/tweet?text=Red%20Lion%20Controls%20Sixnet-Managed%20Industrial%20Switches%2C%20AutomationDirect%20STRIDE-Managed%20Ethernet%20Switches%20Vulnerability+https://www.cisa.gov/news-events/ics-advisories/icsa-17-054-02
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9335
www.dhs.gov
www.dhs.gov/foia
www.dhs.gov/performance-financial-reports
www.facebook.com/CISA
www.facebook.com/sharer/sharer.php?u=https://www.cisa.gov/news-events/ics-advisories/icsa-17-054-02&title=Red%20Lion%20Controls%20Sixnet-Managed%20Industrial%20Switches%2C%20AutomationDirect%20STRIDE-Managed%20Ethernet%20Switches%20Vulnerability
www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
www.instagram.com/cisagov
www.linkedin.com/company/cybersecurity-and-infrastructure-security-agency
www.linkedin.com/sharing/share-offsite/?url=https://www.cisa.gov/news-events/ics-advisories/icsa-17-054-02
www.oig.dhs.gov/
www.usa.gov/
www.whitehouse.gov/
www.youtube.com/@cisagov
mailto:?subject=Red%20Lion%20Controls%20Sixnet-Managed%20Industrial%20Switches%2C%20AutomationDirect%20STRIDE-Managed%20Ethernet%20Switches%20Vulnerability&body=www.cisa.gov/news-events/ics-advisories/icsa-17-054-02
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS
Percentile
69.0%