Multiple vulnerabilities in Hirschmann Automation and Control GmbH Classic Platform Switches

Published: 2018-03-07 14:31:14 | Updated: 2018-03-07
Severity Low
Patch available NO
Number of vulnerabilities 5
CVE ID CVE-2018-5465
CVE-2018-5467
CVE-2018-5471
CVE-2018-5461
CVE-2018-5469
CVSSv3 4.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:W/RC:C]
5.8 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:W/RC:C]
3.3 [CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:W/RC:C]
3.3 [CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:W/RC:C]
6.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:W/RC:C]
CWE ID CWE-384
CWE-598
CWE-300
CWE-307
Exploitation vector Network
Public exploit N/A
Vulnerable software OCTOPUS
MS
MACH4000
MACH1000
MACH100
RSB
RSR
RS
Vulnerable software versions OCTOPUS -
MS -
MACH4000 -
MACH1000 -
MACH100 -
RSB -
RSR -
RS -
Vendor URL Hirschmann

Security Advisory

1) Session hijacking

Description

The vulnerability allows a remote attacker to perform session fixation attack on the target system.

The weakness exists in the web interface due to session fixation vulnerability. A remote attacker can hijack an existing user's session.

Remediation

Workarounds are available on vendor's website.

External links

https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01

2) Information disclosure

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists in the web interface due to information exposure through query strings. A remote attacker can gain access to arbitrary data and impersonate a legitimate user.

Remediation

Workarounds are available on vendor's website.

External links

https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01

3) Man-in-the-middle attack

Description

The vulnerability allows a remote attacker to conduct man-in-the-middle attack.

The weakness exists in the web interface due to cleartext transmission of sensitive information. A remote attacker can use man-in-the-middle technique and obtain sensitive information through a successful man-in-the-middle attack.

Remediation

Workarounds are available on vendor's website.

External links

https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01

4) Man-in-the-middle attack

Description

The vulnerability allows a remote attacker to conduct man-in-the-middle attack.

The weakness exists in the web interface due to inadequate encryption strength vulnerability. A remote attacker can use man-in-the-middle technique and obtain sensitive information.

Remediation

Workarounds are available on vendor's website.

External links

https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01

5) Brute-force attack

Description

The vulnerability allows a remote attacker to conduct brute-force attack.

The weakness exists in the web interface due to improper restriction of excessive authentication. A remote attacker can brute force authentication.

Remediation

Workarounds are available on vendor's website.

External links

https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01

Back to List