Information disclosure in Echelon SmartServer 1, SmartServer 2 and i.LON 100



Published: 2018-07-20
Risk Low
Patch available NO
Number of vulnerabilities 1
CVE-ID CVE-2018-10627
CWE-ID CWE-200
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
i.LON 100
Hardware solutions / Routers & switches, VoIP, GSM, etc

SmartServer 2
Hardware solutions / Routers & switches, VoIP, GSM, etc

SmartServer 1
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor Echelon

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Information disclosure

EUVDB-ID: #VU13929

Risk: Low

CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:W/RC:C]

CVE-ID: CVE-2018-10627

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists due to unspecified flaw. A remote attacker can use the SOAP API to retrieve and change sensitive configuration items such as the usernames and passwords for the Web and FTP servers.

Mitigation

Echelon recommends affected users modify the WebParams.dat file.

Echelon recommends that the following mitigation is implemented until SmartServer 2 Service Pack 7 is installed:

  • All SmartServer and i.LON 600 devices along with any servers using the SmartServer and i.Lon services should be installed behind a firewall or on a VLAN without other devices.
  • Change the username and password during the initial installation of the affected products.
  • Disable unencrypted services and secure encrypted services for the SmartServer or i.LON 100.

Vulnerable software versions

i.LON 100: All versions

SmartServer 2: All versions

SmartServer 1: All versions

External links

http://ics-cert.us-cert.gov/advisories/ICSA-18-200-03


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###