Lucene search

K
ptsecurityPositive TechnologiesPT-2017-08
HistoryMar 16, 2017 - 12:00 a.m.

PT-2017-08: Information Exposure in Hirschmann Automation and Control GmbH Classic Platform Switches

2017-03-1600:00:00
Positive Technologies
www.ptsecurity.com
10

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

24.3%

PT-2017-08: Information Exposure in Hirschmann Automation and Control GmbH Classic Platform Switches

Vulnerable products

RS
Version: all versions
RSR
Version: all versions
RSB
Version: all versions
MACH100
Version: all versions
MACH1000
Version: all versions
MACH4000
Version: all versions
MS
Version: all versions
OCTOPUS
Version: all versions

Link:
<http://www.hirschmann.com/&gt;

Severity level

Severity level: Medium
Impact: Information Exposure
Access Vector: Remote

CVSS v3:
Base Score: 6.5
Vector: (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

CVE: CVE-2018-5467

Vulnerability description

The specialists of the Positive Research center have detected an Information Exposure vulnerability in Hirschmann Automation and Control GmbH Classic Platform Switches.

An information exposure through query strings vulnerability in the web interface of Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches allows attackers to impersonate a legitimate user using specially crafted GET requests and a hardcoded username.

How to fix

Use the recommendations

Advisory status

16.03.2017 - Vendor gets vulnerability details
06.03.2018 - Vendor releases fixed version and details
28.04.2018 - Public disclosure

Credits

The vulnerability was detected by Ilya Karpov, Evgeniy Druzhinin, Mikhail Tsvetkov, and Damir Zainullin, Positive Research Center (Positive Technologies Company)

References

<http://en.securitylab.ru/lab/PT-2017-08&gt;

Reports on the vulnerabilities previously discovered by Positive Research:

https://www.ptsecurity.com/
<https://en.securitylab.ru/lab/&gt;

About Positive Technologies

Positive Technologies is a leading provider of vulnerability assessment, compliance management and threat analysis solutions to more than 1,000 global enterprise clients. Our solutions work seamlessly across your entire business: securing applications in development; assessing your network and application vulnerabilities; assuring compliance with regulatory requirements; and blocking real-time attacks. Our commitment to clients and research has earned Positive Technologies a reputation as one of the foremost authorities on SCADA, Banking, Telecom, Web Application and ERP security, and distinction as the #1 fastest growing Security and Vulnerability Management firm in 2012, as shown in an IDC report*. To learn more about Positive Technologies please visit www.ptsecurity.com

*Source: IDC Worldwide Security and Vulnerability Management 2013-2017 Forecast and 2012 Vendor Shares, doc #242465, August 2013. Based on year-over-year revenue growth in 2012 for vendors with revenues of $20M+

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

24.3%

Related for PT-2017-08