Lucene search

K
nessusThis script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.TENABLE_OT_EATON_CVE-2018-16158.NASL
HistoryJun 20, 2023 - 12:00 a.m.

Eaton Power Xpert Meter Use of Hard-coded Credentials (CVE-2018-16158)

2023-06-2000:00:00
This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
10
eaton power xpert meter
vulnerability
ssh logins
hard-coded credentials
remote access

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.02 Low

EPSS

Percentile

88.8%

Eaton Power Xpert Meter 4000, 6000, and 8000 devices before 13.4.0.10 have a single SSH private key across different customers’ installations and do not properly restrict access to this key, which makes it easier for remote attackers to perform SSH logins (to uid 0) via the PubkeyAuthentication option.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(501192);
  script_version("1.2");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/10/17");

  script_cve_id("CVE-2018-16158");

  script_name(english:"Eaton Power Xpert Meter Use of Hard-coded Credentials (CVE-2018-16158)");

  script_set_attribute(attribute:"synopsis", value:
"The remote OT asset is affected by a vulnerability.");
  script_set_attribute(attribute:"description", value:
"Eaton Power Xpert Meter 4000, 6000, and 8000 devices before 13.4.0.10
have a single SSH private key across different customers'
installations and do not properly restrict access to this key, which
makes it easier for remote attackers to perform SSH logins (to uid 0)
via the PubkeyAuthentication option.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.");
  # http://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/PXM-Advisory.pdf
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?52280b1d");
  # https://github.com/BrianWGray/msf/blob/master/exploits/linux/ssh/eaton_known_privkey.rb
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?807d2336");
  script_set_attribute(attribute:"see_also", value:"https://www.ctrlu.net/vuln/0006.html");
  script_set_attribute(attribute:"solution", value:
"Refer to the vendor advisory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-16158");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_cwe_id(798);

  script_set_attribute(attribute:"vuln_publication_date", value:"2018/08/30");
  script_set_attribute(attribute:"patch_publication_date", value:"2018/08/30");
  script_set_attribute(attribute:"plugin_publication_date", value:"2023/06/20");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:eaton:power_xpert_meter_4000_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:eaton:power_xpert_meter_6000_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:eaton:power_xpert_meter_8000_firmware");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Tenable.ot");

  script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("tenable_ot_api_integration.nasl");
  script_require_keys("Tenable.ot/Eaton");

  exit(0);
}


include('tenable_ot_cve_funcs.inc');

get_kb_item_or_exit('Tenable.ot/Eaton');

var asset = tenable_ot::assets::get(vendor:'Eaton');

var vuln_cpes = {
    "cpe:/o:eaton:power_xpert_meter_4000_firmware" :
        {"versionEndExcluding" : "13.4.0.10", "family" : "PXM4000"},
    "cpe:/o:eaton:power_xpert_meter_6000_firmware" :
        {"versionEndExcluding" : "13.4.0.10", "family" : "PXM6000"},
    "cpe:/o:eaton:power_xpert_meter_8000_firmware" :
        {"versionEndExcluding" : "13.4.0.10", "family" : "PXM8000"}
};

tenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_HOLE);
VendorProductVersionCPE
eatonpower_xpert_meter_4000_firmwarecpe:/o:eaton:power_xpert_meter_4000_firmware
eatonpower_xpert_meter_6000_firmwarecpe:/o:eaton:power_xpert_meter_6000_firmware
eatonpower_xpert_meter_8000_firmwarecpe:/o:eaton:power_xpert_meter_8000_firmware

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.02 Low

EPSS

Percentile

88.8%

Related for TENABLE_OT_EATON_CVE-2018-16158.NASL