Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.TENABLE_OT_WELOTEC_CVE-2023-1083.NASL
HistoryJul 01, 2024 - 12:00 a.m.

Welotec Industrial Routers Improper Access Control (CVE-2023-1083)

2024-07-0100:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
7
welotec industrial routers
improper access control
mqtt topic
configuration commands
reboot commands
firmware updates
tenable.ot
cve-2023-1083
update
firmware v2.3.0.r5542

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

39.3%

An unauthenticated remote attacker who is aware of a MQTT topic name can send and receive messages, including GET/SET configuration commands, reboot commands and firmware updates.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(502288);
  script_version("1.3");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/07/03");

  script_cve_id("CVE-2023-1083");

  script_name(english:"Welotec Industrial Routers Improper Access Control (CVE-2023-1083)");

  script_set_attribute(attribute:"synopsis", value:
"The remote OT asset is affected by a vulnerability.");
  script_set_attribute(attribute:"description", value:
"An unauthenticated remote attacker who is aware of a MQTT topic name can send and receive messages, 
including GET/SET configuration commands, reboot commands and firmware updates.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.");
  script_set_attribute(attribute:"see_also", value:"https://www.cvedetails.com/cve/CVE-2023-1083/");
  script_set_attribute(attribute:"solution", value:
"Update the product to firmware v2.3.0.r5542 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2023-1083");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2024/04/09");
  script_set_attribute(attribute:"patch_publication_date", value:"2024/04/09");
  script_set_attribute(attribute:"plugin_publication_date", value:"2024/07/01");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:welotec:tk515l_firmare");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:welotec:tk515l-w_firmare");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:welotec:tk525l_firmare");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:welotec:tk525l-w_firmare");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:welotec:tk525u_firmare");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:welotec:tk525w_firmare");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:welotec:tk535l1_firmare");
  script_set_attribute(attribute:"generated_plugin", value:"former");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Tenable.ot");

  script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("tenable_ot_api_integration.nasl");
  script_require_keys("Tenable.ot/Welotec");

  exit(0);
}


include('tenable_ot_cve_funcs.inc');

get_kb_item_or_exit('Tenable.ot/Welotec');

var asset = tenable_ot::assets::get(vendor:'Welotec');

var vuln_cpes = {
    "cpe:/o:welotec:tk515l_firmare" :
        {"versionEndExcluding" : "2.3.0.r5542", "family" : "WelotecIndustrialRouters"},
    "cpe:/o:welotec:tk515l-w_firmare" :
        {"versionEndExcluding" : "2.3.0.r5542", "family" : "WelotecIndustrialRouters"},
    "cpe:/o:welotec:tk525l_firmare" :
        {"versionEndExcluding" : "2.3.0.r5542", "family" : "WelotecIndustrialRouters"},
    "cpe:/o:welotec:tk525l-w_firmare" :
        {"versionEndExcluding" : "2.3.0.r5542", "family" : "WelotecIndustrialRouters"},
    "cpe:/o:welotec:tk525u_firmare" :
        {"versionEndExcluding" : "2.3.0.r5542", "family" : "WelotecIndustrialRouters"},
    "cpe:/o:welotec:tk525w_firmare" :
        {"versionEndExcluding" : "2.3.0.r5542", "family" : "WelotecIndustrialRouters"},
    "cpe:/o:welotec:tk535l1_firmare" :
        {"versionEndExcluding" : "2.3.0.r5542", "family" : "WelotecIndustrialRouters"}
};

tenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_HOLE);
VendorProductVersionCPE
welotectk525u_firmarecpe:/o:welotec:tk525u_firmare
welotectk535l1_firmarecpe:/o:welotec:tk535l1_firmare
welotectk525l_firmarecpe:/o:welotec:tk525l_firmare
welotectk515l-w_firmarecpe:/o:welotec:tk515l-w_firmare
welotectk525w_firmarecpe:/o:welotec:tk525w_firmare
welotectk525l-w_firmarecpe:/o:welotec:tk525l-w_firmare
welotectk515l_firmarecpe:/o:welotec:tk515l_firmare

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

39.3%

Related for TENABLE_OT_WELOTEC_CVE-2023-1083.NASL