Multiple vulnerabilities in ATI Emergency Mass Notification Systems



Published: 2018-04-11
Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2018-8862
CVE-2018-8864
CWE-ID CWE-287
CWE-311
Exploitation vector Local network
Public exploit N/A
Vulnerable software
Subscribe
ALERT4000
Hardware solutions / Firmware

MHPSS
Hardware solutions / Firmware

HPSS32
Hardware solutions / Firmware

HPSS16
Hardware solutions / Firmware

Vendor Acoustic Technology

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Improper authentication

EUVDB-ID: #VU11769

Risk: Low

CVSSv3.1: 4.6 [CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-8862

CWE-ID: CWE-287 - Improper Authentication

Exploit availability: No

Description

The vulnerability allows an adjacent attacker to bypass security restrictions on the target system.

The weakness exists due to improper authentication. An adjacent attacker can submit specially crafted malicious radio transmissions, bypass authentication and trigger false alarms.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ALERT4000: All versions

MHPSS: All versions

HPSS32: All versions

HPSS16: All versions

External links

http://ics-cert.us-cert.gov/advisories/ICSA-18-100-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Missing encryption of sensitive data

EUVDB-ID: #VU11770

Risk: Low

CVSSv3.1: 4.6 [CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-8864

CWE-ID: CWE-311 - Missing Encryption of Sensitive Data

Exploit availability: No

Description

The vulnerability allows an adjacent attacker to bypass security restrictions on the target system.

The weakness exists due to missing encryption of sensitive data. An adjacent attacker can submit specially crafted malicious radio transmissions and trigger false alarms.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ALERT4000: All versions

MHPSS: All versions

HPSS32: All versions

HPSS16: All versions

External links

http://ics-cert.us-cert.gov/advisories/ICSA-18-100-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###