CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
43.8%
Title: Sielco PolyEco Digital FM Transmitter 2.0.6 ‘polyeco’ Session Hijacking
Advisory ID: ZSL-2023-5763
Type: Local/Remote
Impact: Security Bypass
Risk: (4/5)
Release Date: 10.04.2023
PolyEco is the innovative family of high-end digital FM transmitters of Sielco. They are especially suited as high performance power system exciters or compact low-mid power transmitters. The same cabinet may in fact be fitted with 50, 100, 300, 500, 1000W power stage (PolyEco50, 100, 300, 500, 1000).
All features can be controlled via the large touch-screen display 4.3" or remotely. Many advanced features are inside by default in the basic version such as: stereo and RDS encoder, audio change-over, remote-control via LAN and SNMP, “FFT” spectral analysis of the audio sources, SFN synchronization and much more.
The Cookie ‘polyeco’ is of an insufficient length and can be exploited by brute force, which may allow a remote attacker to obtain a valid session, bypass authentication and manipulate the transmitter. The session is also visible in an HTTP GET request and there is the lack of SSL in use, allowing MitM attacks.
Sielco S.r.l - <https://www.sielco.org>
PolyEco1000 CPU:2.0.6 FPGA:10.19
PolyEco1000 CPU:1.9.4 FPGA:10.19
PolyEco1000 CPU:1.9.3 FPGA:10.19
PolyEco500 CPU:1.7.0 FPGA:10.16
PolyEco300 CPU:2.0.2 FPGA:10.19
PolyEco300 CPU:2.0.0 FPGA:10.19
lwIP/2.1.1 (http://savannah.nongnu.org/projects/lwip)
[26.01.2023] Vulnerability discovered.
[27.01.2023] Contact with the vendor and CSIRT Italia.
[09.04.2023] No response from the vendor.
[09.04.2023] No response from the CSIRT team.
[10.04.2023] Public security advisory released.
Vulnerability discovered by Gjoko Krstic - <[email protected]>
[1] <https://packetstormsecurity.com/files/171863/>
[2] <https://exchange.xforce.ibmcloud.com/vulnerabilities/253062>
[3] <https://exchange.xforce.ibmcloud.com/vulnerabilities/269696>
[4] <https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07>
[5] <https://nvd.nist.gov/vuln/detail/CVE-2023-0897>
[6] <https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-0897>
[10.04.2023] - Initial release
[03.11.2023] - Added reference [1], [2], [3], [4], [5] and [6]
Zero Science Lab
Web: <https://www.zeroscience.mk>
e-mail: [email protected]
<html><body><p>Sielco PolyEco Digital FM Transmitter 2.0.6 'polyeco' Session Hijacking
Vendor: Sielco S.r.l
Product web page: https://www.sielco.org
Affected version: PolyEco1000 CPU:2.0.6 FPGA:10.19
PolyEco1000 CPU:1.9.4 FPGA:10.19
PolyEco1000 CPU:1.9.3 FPGA:10.19
PolyEco500 CPU:1.7.0 FPGA:10.16
PolyEco300 CPU:2.0.2 FPGA:10.19
PolyEco300 CPU:2.0.0 FPGA:10.19
Summary: PolyEco is the innovative family of high-end digital
FM transmitters of Sielco. They are especially suited as high
performance power system exciters or compact low-mid power
transmitters. The same cabinet may in fact be fitted with 50,
100, 300, 500, 1000W power stage (PolyEco50, 100, 300, 500,
1000).
All features can be controlled via the large touch-screen display
4.3" or remotely. Many advanced features are inside by default
in the basic version such as: stereo and RDS encoder, audio
change-over, remote-control via LAN and SNMP, "FFT" spectral
analysis of the audio sources, SFN synchronization and much more.
Desc: The Cookie 'polyeco' is of an insufficient length and can be
exploited by brute force, which may allow a remote attacker to obtain
a valid session, bypass authentication and manipulate the transmitter.
The session is also visible in an HTTP GET request and there is the
lack of SSL in use, allowing MitM attacks.
Tested on: lwIP/2.1.1 (http://savannah.nongnu.org/projects/lwip)
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
Macedonian Information Security Research and Development Laboratory
Zero Science Lab - https://www.zeroscience.mk - @zeroscience
Advisory ID: ZSL-2023-5763
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5763.php
26.01.2023
--
# Session values (len=5)
Cookie: polyeco=23770
Cookie: polyeco=12397
Cookie: polyeco=54689
...
# GET request for login (user:1234)
http://RADIOFM/login.cgi?user=user&password=c494fe7ab21e23e456a89d5a09828a10&id=14810
The hash = password + id = 123414810, md5(123414810) = c494fe7ab21e23e456a89d5a09828a10
Once authenticated, Cookie: polyeco=14810
</p></body></html>