Lucene search

K
talosTalos IntelligenceTALOS-2020-1136
HistoryDec 16, 2020 - 12:00 a.m.

Lantronix XPort EDGE Web Manager and telnet CLI cleartext transmission of sensitive information vulnerability

2020-12-1600:00:00
Talos Intelligence
www.talosintelligence.com
40
lantronix xport edge
web manager
telnet cli
information disclosure
http request
network sniffing
cvssv3
cwe-319
cleartext transmission
vendor disclosure.

CVSS2

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:N/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N

EPSS

0.004

Percentile

73.3%

Summary

An information disclosure vulnerability exists in the Web Manager and telnet CLI functionality of Lantronix XPort EDGE 3.0.0.0R11, 3.1.0.0R9, 3.4.0.0R12 and 4.2.0.0R7. A specially crafted HTTP request can cause information disclosure. An attacker can sniff the network to trigger this vulnerability.

Tested Versions

Lantronix XPort EDGE 3.0.0.0R11
Lantronix XPort EDGE 3.1.0.0R9
Lantronix XPort EDGE 3.4.0.0R12
Lantronix XPort EDGE 4.2.0.0R7

Product URLs

<https://www.lantronix.com/products/xport-edge/&gt;

CVSSv3 Score

3.1 - CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N

CWE

CWE-319 - Cleartext Transmission of Sensitive Information

Details

The XPort EDGE is a next-generation wired Ethernet gateway for providing secure Ethernet connectivity to serial devices.

When configuring secure credentials for the Lantronix XPort EDGE, TLS private keys and AES encryption and decryption keys are transmitted in cleartext over the network. An attacker can sniff the network communications during configuration and capture these keys. The attacker would then have the ability to man in the middle encrypted communications using these keys.

Timeline

2020-08-10 - Vendor Disclosure
2020-12-16 - Public Release

CVSS2

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:N/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N

EPSS

0.004

Percentile

73.3%

Related for TALOS-2020-1136