Multiple vulnerabilities in Kunbus PR100088 Modbus Gateway



Risk Low
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2019-6527
CVE-2019-6533
CVE-2019-6529
CWE-ID CWE-287
CWE-306
CWE-20
Exploitation vector Network
Public exploit N/A
Vulnerable software
PR100088 Modbus gateway
Hardware solutions / Firmware

Vendor Kunbus

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Improper authentication

EUVDB-ID: #VU17390

Risk: Low

CVSSv4.0: 8 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2019-6527

CWE-ID: CWE-287 - Improper Authentication

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass authentication.

The vulnerability exists due to improper authentication. A remote attacker can bypass authentication and change the password for an admin user who is currently or previously logged in, provided the device has not been restarted.

Mitigation

Update to version R02.

Vulnerable software versions

PR100088 Modbus gateway: All versions

CPE2.3 External links

https://ics-cert.us-cert.gov/advisories/ICSA-19-036-05


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Missing authentication for critical function

EUVDB-ID: #VU17391

Risk: Low

CVSSv4.0: 8 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2019-6533

CWE-ID: CWE-306 - Missing Authentication for Critical Function

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass authentication.

The vulnerability exists due to missing authentication for critical function. A remote attacker can read and write registers used to store Modbus values from the web interface without authentication.

Mitigation

Update to version R02.

Vulnerable software versions

PR100088 Modbus gateway: All versions

CPE2.3 External links

https://ics-cert.us-cert.gov/advisories/ICSA-19-036-05


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper input validation

EUVDB-ID: #VU17392

Risk: Low

CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2019-6529

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote high-privileged attacker to cause DoS condition.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can supply a specially crafted FTP request and crash the device.

Mitigation

Update to version R02.

Vulnerable software versions

PR100088 Modbus gateway: All versions

CPE2.3 External links

https://ics-cert.us-cert.gov/advisories/ICSA-19-036-05


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###