VDE-2018-016

Vulnerability from csaf_pepperlfuchsse - Published: 2018-10-19 10:00 - Updated: 2025-05-14 12:28
Summary
Pepperl+Fuchs: ecom Mobile devices prone to Android privilege elevation vulnerability
Notes
Summary: An attacker may gain access (by elevated privileges) to CT50-Ex mobile computers through a vulnerability in a system service running the Android Operating System (OS). The system service improperly validates incoming connection requests. Although the vulnerability is significant, currently no known exploits publicly available.
Impact: A skilled attacker with advanced knowledge of the target system could exploit this vulnerability by creating an application that would successfully bind to the service and gain elevated system privileges. This may enable the attacker to obtain access to keystrokes, passwords, personal identifiable information, photos, emails, or business-critical documents.
Remediation: An update is available that resolves this vulnerability. All customers using the impacted products should update their products as indicated in the chart below. Only products listed below are affected by this vulnerability. Updates are available via the Pepperl+Fuchs / ecom product support channel or directly from the original manufacturer Honeywell at https://hsmftp.honeywell.com . Pepperl+Fuchs strongly recommends that users upgrade to the version identified below to resolve the vulnerability. CT50-Ex, Android 6.0, Update to CommonES 4.01.00.4134 or later CT50-Ex, Android 6.0, Update ECP to version 2.30.00.0167 or later (if applicable) CT50-Ex, Android 4.4, Update to CommonES 3.17.3445 or later For support, please contact your local Pepperl+Fuchs sales representative.

On Honeywell Mobile Computers (CT60 running Android OS 7.1, CN80 running Android OS 7.1, CT40 running Android OS 7.1, CK75 running Android OS 6.0, CN75 running Android OS 6.0, CN75e running Android OS 6.0, CT50 running Android OS 6.0, D75e running Android OS 6.0, CT50 running Android OS 4.4, D75e running Android OS 4.4, CN51 running Android OS 6.0, EDA50k running Android 4.4, EDA50 running Android OS 7.1, EDA50k running Android OS 7.1, EDA70 running Android OS 7.1, EDA60k running Android OS 7.1, and EDA51 running Android OS 8.1), a skilled attacker with advanced knowledge of the target system could exploit this vulnerability by creating an application that would successfully bind to the service and gain elevated system privileges. This could enable the attacker to obtain access to keystrokes, passwords, personal identifiable information, photos, emails, or business-critical documents.

CWE-269 - Improper Privilege Management
Vendor Fix An update is available that resolves this vulnerability. All customers using the impacted products should update their products as indicated in the chart below. Only products listed below are affected by this vulnerability. Updates are available via the Pepperl+Fuchs / ecom product support channel or directly from the original manufacturer Honeywell at https://hsmftp.honeywell.com . Pepperl+Fuchs strongly recommends that users upgrade to the version identified below to resolve the vulnerability. CT50-Ex, Android 6.0, Update to CommonES 4.01.00.4134 or later CT50-Ex, Android 6.0, Update ECP to version 2.30.00.0167 or later (if applicable) CT50-Ex, Android 4.4, Update to CommonES 3.17.3445 or later For support, please contact your local Pepperl+Fuchs sales representative.
Acknowledgments
CERT@VDE certvde.com

{
  "document": {
    "acknowledgments": [
      {
        "organization": "CERT@VDE",
        "summary": "coordination",
        "urls": [
          "https://certvde.com"
        ]
      }
    ],
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-GB",
    "notes": [
      {
        "category": "summary",
        "text": "An attacker may gain access (by elevated privileges) to CT50-Ex mobile computers through a vulnerability in a system service running the Android Operating System (OS). The system service improperly validates incoming connection requests. Although the vulnerability is significant, currently no known exploits publicly available. ",
        "title": "Summary"
      },
      {
        "category": "description",
        "text": "A skilled attacker with advanced knowledge of the target system could exploit this vulnerability by creating an application that would successfully bind to the service and gain elevated system privileges. This may enable the attacker to obtain access to keystrokes, passwords, personal identifiable information, photos, emails, or business-critical documents.",
        "title": "Impact"
      },
      {
        "category": "description",
        "text": "An update is available that resolves this vulnerability. All customers using the impacted products should update their products as indicated in the chart below. Only products listed below are affected by this vulnerability. Updates are available via the Pepperl+Fuchs / ecom product support channel or directly from the original manufacturer Honeywell at https://hsmftp.honeywell.com .\n\nPepperl+Fuchs strongly recommends that users upgrade to the version identified below to resolve the vulnerability.\n\nCT50-Ex, Android 6.0, Update to CommonES 4.01.00.4134 or later\n\nCT50-Ex, Android 6.0, Update ECP to version 2.30.00.0167 or later (if applicable)\n\nCT50-Ex, Android 4.4, Update to CommonES 3.17.3445 or later\n\nFor support, please contact your local Pepperl+Fuchs sales representative.",
        "title": "Remediation"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "cert@pepperl-fuchs.com",
      "name": "Pepperl+Fuchs SE",
      "namespace": "https://www.pepperl-fuchs.com"
    },
    "references": [
      {
        "category": "external",
        "summary": "CERT@VDE Security Advisories for \tPepperl+Fuchs",
        "url": "https://certvde.com/en/advisories/vendor/pepperl+fuchs/"
      },
      {
        "category": "self",
        "summary": "VDE-2018-016: Pepperl+Fuchs: ecom Mobile devices prone to Android privilege elevation vulnerability - HTML",
        "url": "https://certvde.com/en/advisories/VDE-2018-016"
      },
      {
        "category": "self",
        "summary": "VDE-2018-016: Pepperl+Fuchs: ecom Mobile devices prone to Android privilege elevation vulnerability - CSAF",
        "url": "https://pepperl-fuchs.csaf-tp.certvde.com/.well-known/csaf/white/2018/vde-2018-016.json"
      }
    ],
    "title": "Pepperl+Fuchs: ecom Mobile devices prone to Android privilege elevation vulnerability",
    "tracking": {
      "aliases": [
        "VDE-2018-016"
      ],
      "current_release_date": "2025-05-14T12:28:19.000Z",
      "generator": {
        "date": "2024-07-05T07:42:55.601Z",
        "engine": {
          "name": "Secvisogram",
          "version": "2.5.4"
        }
      },
      "id": "VDE-2018-016",
      "initial_release_date": "2018-10-19T10:00:00.000Z",
      "revision_history": [
        {
          "date": "2018-10-19T10:00:00.000Z",
          "number": "1",
          "summary": "Initial revision."
        },
        {
          "date": "2024-11-06T11:27:01.000Z",
          "number": "2",
          "summary": "Fix: correct certvde domain, added self-reference"
        },
        {
          "date": "2025-05-14T12:28:19.000Z",
          "number": "3",
          "summary": "Fix: version space, firmware category, added distribution"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "CT50-Ex",
                "product": {
                  "name": "CT50-Ex",
                  "product_id": "CSAFPID-1101"
                }
              }
            ],
            "category": "product_family",
            "name": "Hardware"
          },
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "\u003c3.17.3445",
                    "product": {
                      "name": "Firmware CommonES \u003c3.17.3445",
                      "product_id": "CSAFPID-21001"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "\u003c4.01.00.4134",
                    "product": {
                      "name": "Firmware CommonES \u003c4.01.00.4134",
                      "product_id": "CSAFPID-21002"
                    }
                  },
                  {
                    "category": "product_version",
                    "name": "4.01.00.4134",
                    "product": {
                      "name": "Firmware CommonES 4.01.00.4134",
                      "product_id": "CSAFPID-22002"
                    }
                  },
                  {
                    "category": "product_version",
                    "name": "3.17.3445",
                    "product": {
                      "name": "Firmware CommonES 3.17.3445",
                      "product_id": "CSAFPID-22001"
                    }
                  }
                ],
                "category": "product_family",
                "name": "CommonES"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "\u003c2.30.00.0167",
                    "product": {
                      "name": "Firmware ECP \u003c2.30.00.0167",
                      "product_id": "CSAFPID-21003"
                    }
                  },
                  {
                    "category": "product_version",
                    "name": "2.30.00.0167",
                    "product": {
                      "name": "Firmware ECP 2.30.00.0167",
                      "product_id": "CSAFPID-22003"
                    }
                  }
                ],
                "category": "product_family",
                "name": "ECP"
              }
            ],
            "category": "product_family",
            "name": "Firmware"
          },
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version",
                    "name": "6.0",
                    "product": {
                      "name": "Android 6.0",
                      "product_id": "CSAFPID-9001"
                    }
                  },
                  {
                    "category": "product_version",
                    "name": "4.4",
                    "product": {
                      "name": "Android 4.4",
                      "product_id": "CSAFPID-9002"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Android"
              }
            ],
            "category": "product_family",
            "name": "Software"
          }
        ],
        "category": "vendor",
        "name": "Pepperl+Fuchs"
      }
    ],
    "product_groups": [
      {
        "group_id": "CSAFGID-0001",
        "product_ids": [
          "CSAFPID-33001",
          "CSAFPID-33002",
          "CSAFPID-33003"
        ],
        "summary": "Affected products."
      },
      {
        "group_id": "CSAFGID-0002",
        "product_ids": [
          "CSAFPID-34001",
          "CSAFPID-34002",
          "CSAFPID-34003"
        ],
        "summary": "Fixed products."
      }
    ],
    "relationships": [
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Firmware CommonES \u003c3.17.3445 installed on CT50-Ex",
          "product_id": "CSAFPID-31001"
        },
        "product_reference": "CSAFPID-21001",
        "relates_to_product_reference": "CSAFPID-1101"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Firmware CommonES \u003c4.01.00.4134 installed on CT50-Ex",
          "product_id": "CSAFPID-31002"
        },
        "product_reference": "CSAFPID-21002",
        "relates_to_product_reference": "CSAFPID-1101"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Firmware ECP \u003c2.30.00.0167 installed on CT50-Ex",
          "product_id": "CSAFPID-31003"
        },
        "product_reference": "CSAFPID-21003",
        "relates_to_product_reference": "CSAFPID-1101"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Firmware CommonES 3.17.3445 installed on CT50-Ex",
          "product_id": "CSAFPID-32001"
        },
        "product_reference": "CSAFPID-22001",
        "relates_to_product_reference": "CSAFPID-1101"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Firmware CommonES 4.01.00.4134 installed on CT50-Ex",
          "product_id": "CSAFPID-32002"
        },
        "product_reference": "CSAFPID-22002",
        "relates_to_product_reference": "CSAFPID-1101"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Firmware ECP 2.30.00.0167 installed on CT50-Ex",
          "product_id": "CSAFPID-32003"
        },
        "product_reference": "CSAFPID-22003",
        "relates_to_product_reference": "CSAFPID-1101"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Android 6.0 installed on Firmware CommonES \u003c4.01.00.4134 installed on CT50-Ex",
          "product_id": "CSAFPID-33002"
        },
        "product_reference": "CSAFPID-9001",
        "relates_to_product_reference": "CSAFPID-31002"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Android 6.0 installed on Firmware ECP \u003c2.30.00.0167 installed on CT50-Ex",
          "product_id": "CSAFPID-33003"
        },
        "product_reference": "CSAFPID-9001",
        "relates_to_product_reference": "CSAFPID-31003"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Android 4.4 installed on Firmware CommonES \u003c3.17.3445 installed on CT50-Ex",
          "product_id": "CSAFPID-33001"
        },
        "product_reference": "CSAFPID-9002",
        "relates_to_product_reference": "CSAFPID-31001"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Android 6.0 installed on Firmware CommonES 4.01.00.4134 installed on CT50-Ex",
          "product_id": "CSAFPID-34002"
        },
        "product_reference": "CSAFPID-9001",
        "relates_to_product_reference": "CSAFPID-32002"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Android 6.0 installed on Firmware ECP 2.30.00.0167 installed on CT50-Ex",
          "product_id": "CSAFPID-34003"
        },
        "product_reference": "CSAFPID-9001",
        "relates_to_product_reference": "CSAFPID-32003"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Android 4.4 installed on Firmware CommonES 3.17.3445 installed on CT50-Ex",
          "product_id": "CSAFPID-34001"
        },
        "product_reference": "CSAFPID-9002",
        "relates_to_product_reference": "CSAFPID-32001"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2018-14825",
      "cwe": {
        "id": "CWE-269",
        "name": "Improper Privilege Management"
      },
      "notes": [
        {
          "audience": "all",
          "category": "description",
          "text": "On Honeywell Mobile Computers (CT60 running Android OS 7.1, CN80 running Android OS 7.1, CT40 running Android OS 7.1, CK75 running Android OS 6.0, CN75 running Android OS 6.0, CN75e running Android OS 6.0, CT50 running Android OS 6.0, D75e running Android OS 6.0, CT50 running Android OS 4.4, D75e running Android OS 4.4, CN51 running Android OS 6.0, EDA50k running Android 4.4, EDA50 running Android OS 7.1, EDA50k running Android OS 7.1, EDA70 running Android OS 7.1, EDA60k running Android OS 7.1, and EDA51 running Android OS 8.1), a skilled attacker with advanced knowledge of the target system could exploit this vulnerability by creating an application that would successfully bind to the service and gain elevated system privileges. This could enable the attacker to obtain access to keystrokes, passwords, personal identifiable information, photos, emails, or business-critical documents.",
          "title": "Vulnerability Description"
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-34001",
          "CSAFPID-34002",
          "CSAFPID-34003"
        ],
        "known_affected": [
          "CSAFPID-33001",
          "CSAFPID-33002",
          "CSAFPID-33003"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-10-19T10:00:00.000Z",
          "details": "An update is available that resolves this vulnerability. All customers using the impacted products should update their products as indicated in the chart below. Only products listed below are affected by this vulnerability. Updates are available via the Pepperl+Fuchs / ecom product support channel or directly from the original manufacturer Honeywell at https://hsmftp.honeywell.com .\n\nPepperl+Fuchs strongly recommends that users upgrade to the version identified below to resolve the vulnerability.\n\nCT50-Ex, Android 6.0, Update to CommonES 4.01.00.4134 or later\n\nCT50-Ex, Android 6.0, Update ECP to version 2.30.00.0167 or later (if applicable)\n\nCT50-Ex, Android 4.4, Update to CommonES 3.17.3445 or later\n\nFor support, please contact your local Pepperl+Fuchs sales representative.",
          "group_ids": [
            "CSAFGID-0001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "environmentalScore": 5.8,
            "environmentalSeverity": "MEDIUM",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "temporalScore": 5.8,
            "temporalSeverity": "MEDIUM",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-31001",
            "CSAFPID-31002",
            "CSAFPID-31003"
          ]
        }
      ],
      "title": "CVE-2018-14825"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…