Lucene search

K
zeroscienceGjoko KrsticZSL-2023-5762
HistoryMar 30, 2023 - 12:00 a.m.

Sielco Radio Link 2.06 'id' Cookie Brute Force Session Hijacking

2023-03-3000:00:00
Gjoko Krstic
zeroscience.mk
163
sielco
radio link
cookie
brute force
session hijacking
remote attackers
authentication bypass
transmitter manipulation
vulnerability
security advisory
zero science lab

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

51.1%

Title: Sielco Radio Link 2.06 ‘id’ Cookie Brute Force Session Hijacking
Advisory ID: ZSL-2023-5762
Type: Local/Remote
Impact: Security Bypass
Risk: (4/5)
Release Date: 30.03.2023

Summary

Sielco develops and produces radio links for all transmission and reception needs, thanks to innovative units and excellent performances, accompanied by a high reliability and low consumption.

Description

The Cookie session ID ‘id’ is of an insufficient length and can be exploited by brute force, which may allow a remote attacker to obtain a valid session, bypass authentication and manipulate the transmitter.

Vendor

Sielco S.r.l - <https://www.sielco.org>

Affected Version

2.06 (RTX19)
2.05 (RTX19)
2.00 (EXC19)
1.60 (RTX19)
1.59 (RTX19)
1.55 (EXC19)

Tested On

lwIP/2.1.1
Web/2.9.3

Vendor Status

[26.01.2023] Vulnerability discovered.
[27.01.2023] Contact with the vendor and CSIRT Italia.
[29.03.2023] No response from the vendor.
[29.03.2023] No response from the CSIRT team.
[30.03.2023] Public security advisory released.

PoC

sielco_rl_sess.txt

Credits

Vulnerability discovered by Gjoko Krstic - <[email protected]>

References

[1] <https://packetstormsecurity.com/files/171844/Sielco-Radio-Link-2.06-Cookie-Brute-Force.html&gt;
[2] <https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08&gt;
[3] <https://nvd.nist.gov/vuln/detail/CVE-2023-42769&gt;
[4] <https://vulners.com/cve/CVE-2023-42769&gt;
[5] <https://exchange.xforce.ibmcloud.com/vulnerabilities/253073&gt;
[6] <https://exchange.xforce.ibmcloud.com/vulnerabilities/269706&gt;

Changelog

[30.03.2023] - Initial release
[03.11.2023] - Added reference [1], [2], [3], [4], [5] and [6]

Contact

Zero Science Lab

Web: <https://www.zeroscience.mk>
e-mail: [email protected]

<html><body><p>Sielco Radio Link 2.06 'id' Cookie Brute Force Session Hijacking


Vendor: Sielco S.r.l
Product web page: https://www.sielco.org
Affected version: 2.06 (RTX19)
                  2.05 (RTX19)
                  2.00 (EXC19)
                  1.60 (RTX19)
                  1.59 (RTX19)
                  1.55 (EXC19)

Summary: Sielco develops and produces radio links for all
transmission and reception needs, thanks to innovative units
and excellent performances, accompanied by a high reliability
and low consumption.

Desc: The Cookie session ID 'id' is of an insufficient length and
can be exploited by brute force, which may allow a remote attacker
to obtain a valid session, bypass authentication and manipulate
the transmitter.

Tested on: lwIP/2.1.1
           Web/2.9.3


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Advisory ID: ZSL-2023-5762
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5762.php


26.01.2023

--


# Session values (len=5)

Cookie: id=42331
Cookie: id=28903
Cookie: id=+5581
Cookie: id=+9002
...
...
</p></body></html>

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

51.1%