Action not permitted
Modal body text goes here.
Modal Title
Modal Body
BDU:2020-00975
Vulnerability from fstec - Published: 06.03.2018
VLAI Severity ?
Title
Уязвимость веб-интерфейса сетевых коммутаторов Belden Hirschmann серий RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS и OCTOPUS, позволяющая нарушителю получить несанкционированный доступ и перехватить веб-сеансы
Description
Уязвимость веб-интерфейса сетевых коммутаторов Belden Hirschmann серий RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, и OCTOPUS связана с некорректным управлением сеансом. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, получить несанкционированный доступ и перехватить веб-сеансы
Severity ?
Vendor
Belden Inc.
Software Name
Hirschmann RS, Hirschmann RSR, Hirschmann RSB, Hirschmann MACH100, Hirschmann MACH1000, Hirschmann MACH4000, Hirschmann MS, Hirschmann OCTOPUS
Software Version
- (Hirschmann RS), - (Hirschmann RSR), - (Hirschmann RSB), - (Hirschmann MACH100), - (Hirschmann MACH1000), - (Hirschmann MACH4000), - (Hirschmann MS), - (Hirschmann OCTOPUS)
Possible Mitigations
Использование рекомендаций:
https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01
Reference
https://www.sprecher-automation.com/ru/it-bezopasnost/
http://www.securityfocus.com/bid/103340
https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01
https://nvd.nist.gov/vuln/detail/CVE-2018-5465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5465
CWE
CWE-384
{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Belden Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "- (Hirschmann RS), - (Hirschmann RSR), - (Hirschmann RSB), - (Hirschmann MACH100), - (Hirschmann MACH1000), - (Hirschmann MACH4000), - (Hirschmann MS), - (Hirschmann OCTOPUS)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://ics-cert.us-cert.gov/advisories/ICSA-18-065-01",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "06.03.2018",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "12.03.2020",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "12.03.2020",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2020-00975",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2018-5465, BID ID:103340, ICSA-18-065-01",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Hirschmann RS, Hirschmann RSR, Hirschmann RSB, Hirschmann MACH100, Hirschmann MACH1000, Hirschmann MACH4000, Hirschmann MS, Hirschmann OCTOPUS",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Belden Inc. Hirschmann RS - , Belden Inc. Hirschmann RSR - , Belden Inc. Hirschmann RSB - , Belden Inc. Hirschmann MACH100 - , Belden Inc. Hirschmann MACH1000 - , Belden Inc. Hirschmann MACH4000 - , Belden Inc. Hirschmann MS - , Belden Inc. Hirschmann OCTOPUS - ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u0435\u0431-\u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0430 \u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u043a\u043e\u043c\u043c\u0443\u0442\u0430\u0442\u043e\u0440\u043e\u0432 Belden Hirschmann \u0441\u0435\u0440\u0438\u0439 RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS \u0438 OCTOPUS, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u0438 \u043f\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u0438\u0442\u044c \u0432\u0435\u0431-\u0441\u0435\u0430\u043d\u0441\u044b",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0424\u0438\u043a\u0441\u0430\u0446\u0438\u044f \u0441\u0435\u0430\u043d\u0441\u0430 (CWE-384)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u0435\u0431-\u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0430 \u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u043a\u043e\u043c\u043c\u0443\u0442\u0430\u0442\u043e\u0440\u043e\u0432 Belden Hirschmann \u0441\u0435\u0440\u0438\u0439 RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, \u0438 OCTOPUS \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u044b\u043c \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u0441\u0435\u0430\u043d\u0441\u043e\u043c. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u0438 \u043f\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u0438\u0442\u044c \u0432\u0435\u0431-\u0441\u0435\u0430\u043d\u0441\u044b",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0435 \u043c\u0435\u0440\u044b",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u043e\u043a\u0430\u043c\u0438 \u0438 \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435\u043c",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.sprecher-automation.com/ru/it-bezopasnost/\n\nhttp://www.securityfocus.com/bid/103340\n\nhttps://ics-cert.us-cert.gov/advisories/ICSA-18-065-01\nhttps://nvd.nist.gov/vuln/detail/CVE-2018-5465\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5465",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0410\u0421\u0423 \u0422\u041f, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u0421\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0410\u0421\u0423 \u0422\u041f, \u041f\u041e \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0410\u0421\u0423 \u0422\u041f",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-384",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,8)"
}
ICSA-18-065-01
Vulnerability from csaf_cisa - Published: 2018-03-06 00:00 - Updated: 2018-03-06 00:00Summary
Hirschmann Automation and Control GmbH Classic Platform Switches
Notes
CISA Disclaimer: This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov
Legal Notice: All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Risk evaluation: ATTENTION: Exploitable remotely/high skill level is needed to exploit.
Critical infrastructure sectors: Multiple sectors
Countries/areas deployed: Worldwide
Company headquarters location: St. Louis, Missouri
Recommended Practices: NCCIC recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should: Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet; Locate control system networks and remote devices behind firewalls, and isolate them from the business network; When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.
Recommended Practices: NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
Recommended Practices: NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices: Additional mitigation guidance and recommended practices are publicly available in the NCCIC Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site.
Recommended Practices: Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.
Recommended Practices: In addition, NCCIC recommends that users take the following measures to protect themselves from social engineering attacks: Do not click web links or open unsolicited attachments in email messages; Refer to Recognizing and Avoiding Email Scams (https://www.cisa.gov/reading_room/emailscams_0905.pdf) for more information on avoiding email scams; Refer to Avoiding Social Engineering and Phishing Attacks (https://www.cisa.gov/cas/tips/ST04-014.html) for more information on social engineering attacks.
Exploitability: No known public exploits specifically target these vulnerabilities.
7.5 (High)
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Classic Platform Switches RSB: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches RSB
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches OCTOPUS: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches OCTOPUS
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches RS: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches RS
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches MS: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches MS
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches MACH100: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches MACH100
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches RSR: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches RSR
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches MACH1000: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches MACH1000
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches MACH4000: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches MACH4000
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
4.2 (Medium)
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Classic Platform Switches RSB: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches RSB
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches OCTOPUS: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches OCTOPUS
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches RS: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches RS
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches MS: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches MS
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches MACH100: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches MACH100
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches RSR: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches RSR
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches MACH1000: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches MACH1000
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches MACH4000: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches MACH4000
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
5.3 (Medium)
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Classic Platform Switches RSB: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches RSB
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches OCTOPUS: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches OCTOPUS
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches RS: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches RS
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches MS: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches MS
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches MACH100: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches MACH100
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches RSR: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches RSR
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches MACH1000: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches MACH1000
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches MACH4000: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches MACH4000
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
6.5 (Medium)
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Classic Platform Switches RSB: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches RSB
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches OCTOPUS: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches OCTOPUS
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches RS: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches RS
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches MS: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches MS
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches MACH100: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches MACH100
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches RSR: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches RSR
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches MACH1000: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches MACH1000
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches MACH4000: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches MACH4000
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
7.5 (High)
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Classic Platform Switches RSB: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches RSB
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches OCTOPUS: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches OCTOPUS
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches RS: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches RS
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches MS: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches MS
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches MACH100: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches MACH100
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches RSR: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches RSR
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches MACH1000: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches MACH1000
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
|
|
Classic Platform Switches MACH4000: all versions
Hirschmann Automation and Control GmbH, Belden Inc. / Classic Platform Switches MACH4000
|
vers:all/* |
Mitigation
Mitigation
Mitigation
Mitigation
Mitigation
|
References
14 references
Acknowledgments
Positive Technologies
Ilya Karpov
Evgeniy Druzhinin
Mikhail Tsvetkov
Damir Zainullin
{
"document": {
"acknowledgments": [
{
"names": [
"Ilya Karpov",
"Evgeniy Druzhinin",
"Mikhail Tsvetkov",
"Damir Zainullin"
],
"organization": "Positive Technologies",
"summary": "reporting these vulnerabilities to Belden"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "ATTENTION: Exploitable remotely/high skill level is needed to exploit.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Multiple sectors",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "St. Louis, Missouri",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "NCCIC recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should: Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet; Locate control system networks and remote devices behind firewalls, and isolate them from the business network; When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available in the NCCIC Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "In addition, NCCIC recommends that users take the following measures to protect themselves from social engineering attacks: Do not click web links or open unsolicited attachments in email messages; Refer to Recognizing and Avoiding Email Scams (https://www.cisa.gov/reading_room/emailscams_0905.pdf) for more information on avoiding email scams; Refer to Avoiding Social Engineering and Phishing Attacks (https://www.cisa.gov/cas/tips/ST04-014.html) for more information on social engineering attacks.",
"title": "Recommended Practices"
},
{
"category": "other",
"text": "No known public exploits specifically target these vulnerabilities.",
"title": "Exploitability"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-18-065-01 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2018/icsa-18-065-01.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-18-065-01 Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-18-065-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/"
}
],
"title": "Hirschmann Automation and Control GmbH Classic Platform Switches",
"tracking": {
"current_release_date": "2018-03-06T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-18-065-01",
"initial_release_date": "2018-03-06T00:00:00.000000Z",
"revision_history": [
{
"date": "2018-03-06T00:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "ICSA-18-065-01 Hirschmann Automation and Control GmbH Classic Platform Switches"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "Classic Platform Switches RSB: all versions",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "Classic Platform Switches RSB"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "Classic Platform Switches OCTOPUS: all versions",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "Classic Platform Switches OCTOPUS"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "Classic Platform Switches RS: all versions",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "Classic Platform Switches RS"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "Classic Platform Switches MS: all versions",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "Classic Platform Switches MS"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "Classic Platform Switches MACH100: all versions",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "Classic Platform Switches MACH100"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "Classic Platform Switches RSR: all versions",
"product_id": "CSAFPID-0006"
}
}
],
"category": "product_name",
"name": "Classic Platform Switches RSR"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "Classic Platform Switches MACH1000: all versions",
"product_id": "CSAFPID-0007"
}
}
],
"category": "product_name",
"name": "Classic Platform Switches MACH1000"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "Classic Platform Switches MACH4000: all versions",
"product_id": "CSAFPID-0008"
}
}
],
"category": "product_name",
"name": "Classic Platform Switches MACH4000"
}
],
"category": "vendor",
"name": "Hirschmann Automation and Control GmbH, Belden Inc."
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-5465",
"cwe": {
"id": "CWE-384",
"name": "Session Fixation"
},
"notes": [
{
"category": "summary",
"text": "A session fixation vulnerability in the web interface has been identified, which may allow an attacker to hijack web sessions. CVE-2018-5465 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5465"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Disable HTTP for remote management access.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Use the secure HTTPS or SSH protocols for remote management access.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Use of complex user passwords.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Use the \u201cRestricted Management Access\u201d feature to restrict access to known IP addresses.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Disable remote management access when not in use.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2018-5467",
"cwe": {
"id": "CWE-598",
"name": "Use of GET Request Method With Sensitive Query Strings"
},
"notes": [
{
"category": "summary",
"text": "An information exposure through query strings vulnerability in the web interface has been identified, which may allow an attacker to impersonate a legitimate user. CVE-2018-5467 has been assigned to this vulnerability. A CVSS v3 base score of 4.2 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5467"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Disable HTTP for remote management access.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Use the secure HTTPS or SSH protocols for remote management access.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Use of complex user passwords.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Use the \u201cRestricted Management Access\u201d feature to restrict access to known IP addresses.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Disable remote management access when not in use.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2018-5471",
"cwe": {
"id": "CWE-319",
"name": "Cleartext Transmission of Sensitive Information"
},
"notes": [
{
"category": "summary",
"text": "A cleartext transmission of sensitive information vulnerability in the web interface has been identified, which may allow an attacker to obtain sensitive information through a successful man-in-the-middle attack. CVE-2018-5471 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5471"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Disable HTTP for remote management access.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Use the secure HTTPS or SSH protocols for remote management access.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Use of complex user passwords.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Use the \u201cRestricted Management Access\u201d feature to restrict access to known IP addresses.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Disable remote management access when not in use.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2018-5461",
"cwe": {
"id": "CWE-326",
"name": "Inadequate Encryption Strength"
},
"notes": [
{
"category": "summary",
"text": "An inadequate encryption strength vulnerability in the web interface has been identified, which may allow an attacker to obtain sensitive information through a successful man-in-the-middle attack. CVE-2018-5461 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5461"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Disable HTTP for remote management access.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Use the secure HTTPS or SSH protocols for remote management access.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Use of complex user passwords.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Use the \u201cRestricted Management Access\u201d feature to restrict access to known IP addresses.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Disable remote management access when not in use.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2018-5469",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"notes": [
{
"category": "summary",
"text": "An improper restriction of excessive authentication vulnerability in the web interface has been identified, which may allow an attacker to brute force authentication. CVE-2018-5469 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5469"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Disable HTTP for remote management access.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Use the secure HTTPS or SSH protocols for remote management access.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Use of complex user passwords.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Use the \u201cRestricted Management Access\u201d feature to restrict access to known IP addresses.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Disable remote management access when not in use.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…