VDE-2023-028

Vulnerability from csaf_aumariestergmbhcokg - Published: 2023-08-07 11:35 - Updated: 2025-05-14 13:00
Summary
AUMA: SIMA Master Station affected by WRECK vulnerability
Notes
Summary: Forescout Research Labs, partnering with JSOF Research, disclosed NAME:WRECK, a set of Domain Name System (DNS) vulnerabilities that have the potential to cause either Denial of Service (DoS) or Remote Code Execution, allowing attackers to take targeted devices offline or to gain control over them. The vulnerability could be exploited by an attacker on the same network or on a remote network by spoofing packets.
Impact: This vulnerability may lead to a Denial of Service (DoS) or arbitrary code execution on affected SIMA² Master Stations. This may allow an adversary to take the device offline or to take over control of the device.
Mitigation: In case you cannot upgrade your SIMA² Master Station to software Version 2.6 or above, it is recommended to configure the use of internal DNS servers only and block external DNS traffic where possible. It is also recommended to segment networks and shield affected devices from untrusted networks, e.g., using firewalls. Network intrusion detection mechanisms can be used to filter malicious packets.
Remediation: The described vulnerabilities have been fixed in the SIMA² Master Stations with software version V 2.6 or higher. SIMA² Master Stations with software versions < V 2.6 can be upgraded. AUMA recommends applying a product update at the earliest convenience.
CWE-787 - Out-of-bounds Write
Mitigation In case you cannot upgrade your SIMA² Master Station to software Version 2.6 or above, it is recommended to configure the use of internal DNS servers only and block external DNS traffic where possible. It is also recommended to segment networks and shield affected devices from untrusted networks, e.g., using firewalls. Network intrusion detection mechanisms can be used to filter malicious packets.
Vendor Fix The described vulnerabilities have been fixed in the SIMA² Master Stations with software version V 2.6 or higher. SIMA² Master Stations with software versions < V 2.6 can be upgraded. AUMA recommends applying a product update at the earliest convenience.
Acknowledgments

{
  "document": {
    "acknowledgments": [
      {
        "organization": "CERTVDE",
        "summary": "coordination",
        "urls": [
          "https://certvde.com"
        ]
      }
    ],
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-GB",
    "notes": [
      {
        "category": "summary",
        "text": "Forescout Research Labs, partnering with JSOF Research, disclosed NAME:WRECK, a set of Domain Name System (DNS) vulnerabilities that have the potential to cause either Denial of Service (DoS) or Remote Code Execution, allowing attackers to take targeted devices offline or to gain control over them. The vulnerability could be exploited by an attacker on the same network or on a remote network by spoofing packets.",
        "title": "Summary"
      },
      {
        "category": "description",
        "text": "This vulnerability may lead to a Denial of Service (DoS) or arbitrary code execution on affected SIMA\u00b2 Master Stations. This may allow an adversary to take the device offline or to take over control of the device.",
        "title": "Impact"
      },
      {
        "category": "description",
        "text": "In case you cannot upgrade your SIMA\u00b2 Master Station to software Version 2.6 or above, it is recommended to configure the use of internal DNS servers only and block external DNS traffic where possible. It is also recommended to segment networks and shield affected devices from untrusted networks, e.g., using firewalls. Network intrusion detection mechanisms can be used to filter malicious packets.",
        "title": "Mitigation"
      },
      {
        "category": "description",
        "text": "The described vulnerabilities have been fixed in the SIMA\u00b2 Master Stations with software version V 2.6 or higher. SIMA\u00b2 Master Stations with software versions \u003c V 2.6 can be upgraded. AUMA recommends applying a product update at the earliest convenience.",
        "title": "Remediation"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "psirt@auma.com",
      "name": "AUMA Riester GmbH \u0026 Co. KG",
      "namespace": "https://auma.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "VDE-2023-028: AUMA: SIMA Master Station affected by WRECK vulnerability - HTML",
        "url": "https://certvde.com/de/advisories/VDE-2023-028/"
      },
      {
        "category": "external",
        "summary": "CERT@VDE Security Advisories for AUMA Riester GmbH \u0026 Co. KG",
        "url": "https://certvde.com/en/advisories/vendor/auma/"
      },
      {
        "category": "self",
        "summary": "VDE-2023-028: AUMA: SIMA Master Station affected by WRECK vulnerability - CSAF",
        "url": "https://auma.csaf-tp.certvde.com/.well-known/csaf/white/2023/vde-2023-028.json"
      }
    ],
    "title": "AUMA: SIMA Master Station affected by WRECK vulnerability",
    "tracking": {
      "aliases": [
        "VDE-2023-028"
      ],
      "current_release_date": "2025-05-14T13:00:15.000Z",
      "generator": {
        "date": "2025-03-19T14:52:53.167Z",
        "engine": {
          "name": "Secvisogram",
          "version": "2.5.21"
        }
      },
      "id": "VDE-2023-028",
      "initial_release_date": "2023-08-07T11:35:00.000Z",
      "revision_history": [
        {
          "date": "2023-08-07T11:35:00.000Z",
          "number": "1",
          "summary": "initial revision"
        },
        {
          "date": "2025-05-14T13:00:15.000Z",
          "number": "2",
          "summary": "Fix: added distribution"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SIMA\u00b2 Master Station",
                "product": {
                  "name": "SIMA\u00b2 Master Station",
                  "product_id": "CSAFPID-11001"
                }
              }
            ],
            "category": "product_family",
            "name": "Hardware"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cv2.6",
                "product": {
                  "name": "Firmware \u003cv2.6",
                  "product_id": "CSAFPID-21001"
                }
              },
              {
                "category": "product_version",
                "name": "v2.6",
                "product": {
                  "name": "Firmware v2.6",
                  "product_id": "CSAFPID-22001"
                }
              }
            ],
            "category": "product_family",
            "name": "Firmware"
          }
        ],
        "category": "vendor",
        "name": "AUMA Riester GmbH \u0026 Co. KG"
      }
    ],
    "relationships": [
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Firmware \u003cv2.6 installed on SIMA\u00b2 Master Station",
          "product_id": "CSAFPID-31001"
        },
        "product_reference": "CSAFPID-21001",
        "relates_to_product_reference": "CSAFPID-11001"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Firmware v2.6 installed on SIMA\u00b2 Master Station",
          "product_id": "CSAFPID-32001"
        },
        "product_reference": "CSAFPID-22001",
        "relates_to_product_reference": "CSAFPID-11001"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2016-20009",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "** UNSUPPORTED WHEN ASSIGNED ** A DNS client stack-based buffer overflow in ipdnsc_decode_name() affects Wind River VxWorks 6.5 through 7. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-32001"
        ],
        "known_affected": [
          "CSAFPID-31001"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "In case you cannot upgrade your SIMA\u00b2 Master Station to software Version 2.6 or above, it is recommended to configure the use of internal DNS servers only and block external DNS traffic where possible. It is also recommended to segment networks and shield affected devices from untrusted networks, e.g., using firewalls. Network intrusion detection mechanisms can be used to filter malicious packets.",
          "product_ids": [
            "CSAFPID-31001"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "The described vulnerabilities have been fixed in the SIMA\u00b2 Master Stations with software version V 2.6 or higher. SIMA\u00b2 Master Stations with software versions \u003c V 2.6 can be upgraded. AUMA recommends applying a product update at the earliest convenience.",
          "product_ids": [
            "CSAFPID-31001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "environmentalScore": 9.8,
            "environmentalSeverity": "CRITICAL",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "temporalScore": 9.8,
            "temporalSeverity": "CRITICAL",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-31001"
          ]
        }
      ],
      "title": "CVE-2016-20009"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…