Lucene search

K
thnThe Hacker NewsTHN:90B75B1B331E0F0AEE2B68F33BD2B4BC
HistoryAug 12, 2024 - 6:57 a.m.

Industrial Remote Access Tool Ewon Cosy+ Vulnerable to Root Access Attacks

2024-08-1206:57:00
The Hacker News
thehackernews.com
15
ewon cosy+
root access attacks
vpn hijacking
vulnerabilities
security risks
firmware versions
cve-2024-33892
cve-2024-33893
cve-2024-33894
vpn connection
openvpn
operating system
xss vulnerability
administrative access
industrial infrastructure

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

AI Score

8.3

Confidence

High

EPSS

0.002

Percentile

52.4%

Industrial Remote Access Tool

Security vulnerabilities have been disclosed in the industrial remote access solution Ewon Cosy+ that could be abused to gain root privileges to the devices and stage follow-on attacks.

The elevated access could then be weaponized to decrypt encrypted firmware files and encrypted data such as passwords in configuration files, and even get correctly signed X.509 VPN certificates for foreign devices to take over their VPN sessions.

“This allows attackers hijacking VPN sessions which results in significant security risks against users of the Cosy+ and the adjacent industrial infrastructure,” SySS GmbH security researcher Moritz Abrell said in a new analysis.

Cybersecurity

The findings were presented at the DEF CON 32 conference over the weekend. Following responsible disclosure, the issues have been addressed in firmware versions 21.2s10 and 22.1s3 as part of an advisory [PDF] issued by Ewon on July 29, 2024 -

  • CVE-2024-33892 (CVSS score: 7.4) - Information leakage through cookies
  • CVE-2024-33893 (CVSS score: 2.1) - XSS when displaying the logs due to improper input sanitization
  • CVE-2024-33894 (CVSS score: 1.0) - Execution of several processes with elevated privileges
  • CVE-2024-33895 (CVSS score: 4.4) - Usage of a unique key to encrypt the configuration parameters
  • CVE-2024-33896 (CVSS score: 3.3) - Code injection due to improper parameter blacklisting
  • CVE-2024-33897 (CVSS score: N/A) - A compromised devices could be used to request a Certificate Signing Request (CSR) from Talk2m for another device, resulting in an availability issue

Ewon Cosy+'s architecture involves the use of a VPN connection that’s routed to a vendor-managed platform called Talk2m via OpenVPN. Technicians can remotely connect to the industrial gateway by means of a VPN relay that occurs through OpenVPN.

The Germany-based pentest company said it was able to uncover an operating system command injection vulnerability and a filter bypass that made it possible to obtain a reverse shell by uploading a specially crafted OpenVPN configuration.

An attacker could have subsequently taken advantage of a persistent cross-site scripting (XSS) vulnerability and the fact that the device stores the Base64-encoded credentials of the current web session in an unprotected cookie-named credentials to gain administrative access and ultimately root it.

Industrial Remote Access Tool

“An unauthenticated attacker can gain root access to the Cosy+ by combining the found vulnerabilities and e.g., waiting for an admin user to log in to the device,” Abrell said.

The attack chain could then be extended further to set up persistence, access firmware-specific encryption keys, and decrypt the firmware update file. What’s more, a hard-coded key stored within the binary for password encryption could be leveraged to extract the secrets.

Industrial Remote Access Tool

“The communication between the Cosy+ and the Talk2m API is done via HTTPS and secured via mutual TLS (mTLS) authentication,” Abrell explained. “If a Cosy+ device is assigned to a Talk2m account, the device generates a certificate signing request (CSR) containing its serial number as common name (CN) and sends it to the Talk2m API.”

This certificate, which can be accessed via the Talk2m API by the device, is used for OpenVPN authentication. However, SySS found that the sole reliance on the device serial number could be exploited by a threat actor to enroll their own CSR with a serial number if a target device and successfully initiate a VPN session.

Cybersecurity

“The original VPN session will be overwritten, and thus the original device is not accessible anymore,” Abrell said. “If Talk2m users connect to the device using the VPN client software Ecatcher, they will be forwarded to the attacker.”

“This allows attackers to conduct further attacks against the used client, for example accessing network services such as RDP or SMB of the victim client. The fact that the tunnel connection itself is not restricted favors this attack.”

“Since the network communication is forwarded to the attacker, the original network and systems could be imitated in order to intercept the victim’s user input such as the uploaded PLC programs or similar.”

The development comes as Microsoft uncovered multiple flaws in OpenVPN that could be chained to achieve remote code execution (RCE) and local privilege escalation (LPE).

(The story was updated after publication to include additional details about the CVE identifiers and the availability of the patches.)

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

AI Score

8.3

Confidence

High

EPSS

0.002

Percentile

52.4%

Related for THN:90B75B1B331E0F0AEE2B68F33BD2B4BC