Lucene search

K
nessusThis script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.TENABLE_OT_SEL_CVE-2017-7928.NASL
HistoryFeb 07, 2022 - 12:00 a.m.

Schweitzer Engineering Laboratories, Inc. SEL-3620 and SEL-3622 Improper Access Control (CVE-2017-7928)

2022-02-0700:00:00
This script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
11

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.0%

An Improper Access Control issue was discovered in Schweitzer Engineering Laboratories (SEL) SEL-3620 and SEL-3622 Security Gateway Versions R202 and, R203, R203-V1, R203-V2 and, R204, R204-V1. The device does not properly enforce access control while configured for NAT port forwarding, which may allow for unauthorized communications to downstream devices.

This plugin only works with Tenable.ot. Please visit https://www.tenable.com/products/tenable-ot for more information.

#%NASL_MIN_LEVEL 70300
##
# (C) Tenable Network Security, Inc.
##

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(500541);
  script_version("1.8");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/03/04");

  script_cve_id("CVE-2017-7928");

  script_name(english:"Schweitzer Engineering Laboratories, Inc. SEL-3620 and SEL-3622 Improper Access Control (CVE-2017-7928)");

  script_set_attribute(attribute:"synopsis", value:
"The remote OT asset is affected by a vulnerability.");
  script_set_attribute(attribute:"description", value:
"An Improper Access Control issue was discovered in Schweitzer Engineering Laboratories (SEL) SEL-3620 and SEL-3622
Security Gateway Versions R202 and, R203, R203-V1, R203-V2 and, R204, R204-V1. The device does not properly enforce
access control while configured for NAT port forwarding, which may allow for unauthorized communications to downstream
devices.  

This plugin only works with Tenable.ot. Please visit https://www.tenable.com/products/tenable-ot for more
information.");
  script_set_attribute(attribute:"see_also", value:"https://ics-cert.us-cert.gov/advisories/ICSA-17-192-06");
  script_set_attribute(attribute:"see_also", value:"http://www.securityfocus.com/bid/99536");
  script_set_attribute(attribute:"solution", value:
"The following text was originally created by the Cybersecurity and Infrastructure Security Agency (CISA). The original
can be found at CISA.gov.

SEL has determined that, when NAT port forwarding is not used, all routed traffic is filtered properly through the
firewall access control lists. If NAT port forwarding is required, SEL recommends that users of affected products
contact their SEL Sales Representative or Customer Service Representative to obtain a no-cost firmware upgrade CD-ROM
packet including upgrade instructions.

Contact can be made at the following location:

https://selinc.com/support/?categories.Sales");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-7928");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2017/08/07");
  script_set_attribute(attribute:"patch_publication_date", value:"2017/08/07");
  script_set_attribute(attribute:"plugin_publication_date", value:"2022/02/07");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:selinc:sel-3620_firmware:r203");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:selinc:sel-3620_firmware:r203-v");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:selinc:sel-3620_firmware:r204-v1");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:selinc:sel-3620_firmware:r202");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:selinc:sel-3620_firmware:r203-v1");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:selinc:sel-3620_firmware:r204");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:selinc:sel-3622_firmware:r203-v1");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:selinc:sel-3622_firmware:r204");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:selinc:sel-3622_firmware:r202");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:selinc:sel-3622_firmware:r203");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:selinc:sel-3622_firmware:r203-v");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:selinc:sel-3622_firmware:r204-v1");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Tenable.ot");

  script_copyright(english:"This script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("tenable_ot_api_integration.nasl");
  script_require_keys("Tenable.ot/SEL");

  exit(0);
}


include('tenable_ot_cve_funcs.inc');

get_kb_item_or_exit('Tenable.ot/SEL');

var asset = tenable_ot::assets::get(vendor:'SEL');

var vuln_cpes = {
    "cpe:/o:selinc:sel-3620_firmware:r203" :
        {"versionEndIncluding" : "r203", "versionStartIncluding" : "r203", "family" : "Sel"},
    "cpe:/o:selinc:sel-3620_firmware:r203-v" :
        {"versionEndIncluding" : "r203-v", "versionStartIncluding" : "r203-v", "family" : "Sel"},
    "cpe:/o:selinc:sel-3620_firmware:r204-v1" :
        {"versionEndIncluding" : "r204-v1", "versionStartIncluding" : "r204-v1", "family" : "Sel"},
    "cpe:/o:selinc:sel-3620_firmware:r202" :
        {"versionEndIncluding" : "r202", "versionStartIncluding" : "r202", "family" : "Sel"},
    "cpe:/o:selinc:sel-3620_firmware:r203-v1" :
        {"versionEndIncluding" : "r203-v1", "versionStartIncluding" : "r203-v1", "family" : "Sel"},
    "cpe:/o:selinc:sel-3620_firmware:r204" :
        {"versionEndIncluding" : "r204", "versionStartIncluding" : "r204", "family" : "Sel"},
    "cpe:/o:selinc:sel-3622_firmware:r203-v1" :
        {"versionEndIncluding" : "r203-v1", "versionStartIncluding" : "r203-v1", "family" : "Sel"},
    "cpe:/o:selinc:sel-3622_firmware:r204" :
        {"versionEndIncluding" : "r204", "versionStartIncluding" : "r204", "family" : "Sel"},
    "cpe:/o:selinc:sel-3622_firmware:r202" :
        {"versionEndIncluding" : "r202", "versionStartIncluding" : "r202", "family" : "Sel"},
    "cpe:/o:selinc:sel-3622_firmware:r203" :
        {"versionEndIncluding" : "r203", "versionStartIncluding" : "r203", "family" : "Sel"},
    "cpe:/o:selinc:sel-3622_firmware:r203-v" :
        {"versionEndIncluding" : "r203-v", "versionStartIncluding" : "r203-v", "family" : "Sel"},
    "cpe:/o:selinc:sel-3622_firmware:r204-v1" :
        {"versionEndIncluding" : "r204-v1", "versionStartIncluding" : "r204-v1", "family" : "Sel"}
};

tenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_HOLE);
VendorProductVersionCPE
selincsel-3620_firmwarer203cpe:/o:selinc:sel-3620_firmware:r203
selincsel-3620_firmwarer203-vcpe:/o:selinc:sel-3620_firmware:r203-v
selincsel-3620_firmwarer204-v1cpe:/o:selinc:sel-3620_firmware:r204-v1
selincsel-3620_firmwarer202cpe:/o:selinc:sel-3620_firmware:r202
selincsel-3620_firmwarer203-v1cpe:/o:selinc:sel-3620_firmware:r203-v1
selincsel-3620_firmwarer204cpe:/o:selinc:sel-3620_firmware:r204
selincsel-3622_firmwarer203-v1cpe:/o:selinc:sel-3622_firmware:r203-v1
selincsel-3622_firmwarer204cpe:/o:selinc:sel-3622_firmware:r204
selincsel-3622_firmwarer202cpe:/o:selinc:sel-3622_firmware:r202
selincsel-3622_firmwarer203cpe:/o:selinc:sel-3622_firmware:r203
Rows per page:
1-10 of 121

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.0%

Related for TENABLE_OT_SEL_CVE-2017-7928.NASL