Information disclosure in Siemens BACnet Field Panels



Published: 2017-10-13 | Updated: 2022-05-26
Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2017-9946
CVE-2017-9947
CWE-ID CWE-288
CWE-22
Exploitation vector Network
Public exploit Public exploit code for vulnerability #2 is available.
Vulnerable software
Subscribe
BACnet Field Panels
Hardware solutions / Firmware

Vendor Siemens

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Authentication bypass

EUVDB-ID: #VU8819

Risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-9946

CWE-ID: CWE-288 - Authentication Bypass Using an Alternate Path or Channel

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to authentication bypass. A remote attacker with network access to the integrated web server (Ports 80/TCP and 443/TCP) can bypass authentication and download information from the device.

Mitigation

Update to version 3.5.

Vulnerable software versions

BACnet Field Panels: All versions

External links

http://ics-cert.us-cert.gov/advisories/ICSA-17-285-05


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Path traversal

EUVDB-ID: #VU8820

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2017-9947

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to path traversal. A remote attacker with network access to the integrated web server (Ports 80/TCP and 443/TCP) can obtain information on the structure of the file system of the affected devices.

Mitigation

Update to version 3.5.

Vulnerable software versions

BACnet Field Panels: All versions

External links

http://ics-cert.us-cert.gov/advisories/ICSA-17-285-05


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###