Multiple vulnerabilities in Weidmüller Industrial Ethernet Switches



Published: 2019-12-06
Risk High
Patch available YES
Number of vulnerabilities 5
CVE-ID CVE-2019-16674
CVE-2019-16673
CVE-2019-16672
CVE-2019-16671
CVE-2019-16670
CWE-ID CWE-341
CWE-256
CWE-319
CWE-400
CWE-307
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
IE-SW-VL05M-5TX
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-VL05MT-5TX
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-VL05M-3TX-2SC
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-VL05MT-3TX-2SC
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-VL05M-3TX-2ST
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-VL05MT-3TX-2ST
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-VL08MT-8TX
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-VL08MT-5TX-3SC
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-VL08MT-5TX-1SC-2SCS
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-VL08MT-6TX-2ST
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-VL08MT-6TX-2SC
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-VL08MT-6TX-2SCS
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-PL08M-8TX
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-PL08MT-8TX
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-PL08M-6TX-2SC
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-PL08MT-6TX-2SC
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-PL08M-6TX-2ST
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-PL08MT-6TX-2ST
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-PL08M-6TX-2SCS
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-PL08MT-6TX-2SCS
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-PL10M-3GT-7TX
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-PL10MT-3GT-7TX
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-PL10M-1GT-2GS-7TX
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-PL10MT-1GT-2GS-7TX
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-PL16M-16TX
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-PL16MT-16TX
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-PL16M-14TX-2SC
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-PL16MT-14TX-2SC
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-PL16M-14TX-2ST
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-PL16MT-14TX-2ST
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-PL18M-2GC-16TX
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-PL18MT-2GC-16TX
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-PL18M-2GC14TX2SC
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-PL18MT-2GC14TX2SC
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-PL18M-2GC14TX2ST
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-PL18MT-2GC14TX2ST
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-PL18M-2GC14TX2SCS
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-PL18MT-2GC14TX2SCS
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-PL09M-5GC-4GT
Hardware solutions / Routers & switches, VoIP, GSM, etc

IE-SW-PL09MT-5GC-4GT
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor Weidmüller

Security Bulletin

This security bulletin contains information about 5 vulnerabilities.

1) Predictable from Observable State

EUVDB-ID: #VU23437

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-16674

CWE-ID: CWE-341 - Predictable from Observable State

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to admin password.

The vulnerability exists due authentication information used in a cookie is predictable. A remote attacker can compromise the admin password when captured on the network.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

IE-SW-VL05M-5TX: 3.6.6

IE-SW-VL05MT-5TX: 3.6.6

IE-SW-VL05M-3TX-2SC: 3.6.6

IE-SW-VL05MT-3TX-2SC: 3.6.6

IE-SW-VL05M-3TX-2ST: 3.6.6

IE-SW-VL05MT-3TX-2ST: 3.6.6

IE-SW-VL08MT-8TX: 3.5.2

IE-SW-VL08MT-5TX-3SC: 3.5.2

IE-SW-VL08MT-5TX-1SC-2SCS: 3.5.2

IE-SW-VL08MT-6TX-2ST: 3.5.2

IE-SW-VL08MT-6TX-2SC: 3.5.2

IE-SW-VL08MT-6TX-2SCS: 3.5.2

IE-SW-PL08M-8TX: 3.3.8

IE-SW-PL08MT-8TX: 3.3.8

IE-SW-PL08M-6TX-2SC: 3.3.8

IE-SW-PL08MT-6TX-2SC: 3.3.8

IE-SW-PL08M-6TX-2ST: 3.3.8

IE-SW-PL08MT-6TX-2ST: 3.3.8

IE-SW-PL08M-6TX-2SCS: 3.3.8

IE-SW-PL08MT-6TX-2SCS: 3.3.8

IE-SW-PL10M-3GT-7TX: 3.3.16

IE-SW-PL10MT-3GT-7TX: 3.3.16

IE-SW-PL10M-1GT-2GS-7TX: 3.3.16

IE-SW-PL10MT-1GT-2GS-7TX: 3.3.16

IE-SW-PL16M-16TX: 3.4.2

IE-SW-PL16MT-16TX: 3.4.2

IE-SW-PL16M-14TX-2SC: 3.4.2

IE-SW-PL16MT-14TX-2SC: 3.4.2

IE-SW-PL16M-14TX-2ST: 3.4.2

IE-SW-PL16MT-14TX-2ST: 3.4.2

IE-SW-PL18M-2GC-16TX: 3.4.4

IE-SW-PL18MT-2GC-16TX: 3.4.4

IE-SW-PL18M-2GC14TX2SC: 3.4.4

IE-SW-PL18MT-2GC14TX2SC: 3.4.4

IE-SW-PL18M-2GC14TX2ST: 3.4.4

IE-SW-PL18MT-2GC14TX2ST: 3.4.4

IE-SW-PL18M-2GC14TX2SCS: 3.4.4

IE-SW-PL18MT-2GC14TX2SCS: 3.4.4

IE-SW-PL09M-5GC-4GT: 3.3.4

IE-SW-PL09MT-5GC-4GT: 3.3.4

External links

http://cert.vde.com/en-us/advisories/vde-2019-018


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Unprotected Storage of Credentials

EUVDB-ID: #VU23436

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-16673

CWE-ID: CWE-256 - Unprotected Storage of Credentials

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to other users' credentials.

The vulnerability exists due to application stored credentials in plain text in a configuration file on the system. A remote attacker with access to the device can view contents of the configuration file and gain access to passwords for 3rd party integration.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

IE-SW-VL05M-5TX: 3.6.6

IE-SW-VL05MT-5TX: 3.6.6

IE-SW-VL05M-3TX-2SC: 3.6.6

IE-SW-VL05MT-3TX-2SC: 3.6.6

IE-SW-VL05M-3TX-2ST: 3.6.6

IE-SW-VL05MT-3TX-2ST: 3.6.6

IE-SW-VL08MT-8TX: 3.5.2

IE-SW-VL08MT-5TX-3SC: 3.5.2

IE-SW-VL08MT-5TX-1SC-2SCS: 3.5.2

IE-SW-VL08MT-6TX-2ST: 3.5.2

IE-SW-VL08MT-6TX-2SC: 3.5.2

IE-SW-VL08MT-6TX-2SCS: 3.5.2

IE-SW-PL08M-8TX: 3.3.8

IE-SW-PL08MT-8TX: 3.3.8

IE-SW-PL08M-6TX-2SC: 3.3.8

IE-SW-PL08MT-6TX-2SC: 3.3.8

IE-SW-PL08M-6TX-2ST: 3.3.8

IE-SW-PL08MT-6TX-2ST: 3.3.8

IE-SW-PL08M-6TX-2SCS: 3.3.8

IE-SW-PL08MT-6TX-2SCS: 3.3.8

IE-SW-PL10M-3GT-7TX: 3.3.16

IE-SW-PL10MT-3GT-7TX: 3.3.16

IE-SW-PL10M-1GT-2GS-7TX: 3.3.16

IE-SW-PL10MT-1GT-2GS-7TX: 3.3.16

IE-SW-PL16M-16TX: 3.4.2

IE-SW-PL16MT-16TX: 3.4.2

IE-SW-PL16M-14TX-2SC: 3.4.2

IE-SW-PL16MT-14TX-2SC: 3.4.2

IE-SW-PL16M-14TX-2ST: 3.4.2

IE-SW-PL16MT-14TX-2ST: 3.4.2

IE-SW-PL18M-2GC-16TX: 3.4.4

IE-SW-PL18MT-2GC-16TX: 3.4.4

IE-SW-PL18M-2GC14TX2SC: 3.4.4

IE-SW-PL18MT-2GC14TX2SC: 3.4.4

IE-SW-PL18M-2GC14TX2ST: 3.4.4

IE-SW-PL18MT-2GC14TX2ST: 3.4.4

IE-SW-PL18M-2GC14TX2SCS: 3.4.4

IE-SW-PL18MT-2GC14TX2SCS: 3.4.4

IE-SW-PL09M-5GC-4GT: 3.3.4

IE-SW-PL09MT-5GC-4GT: 3.3.4

External links

http://cert.vde.com/en-us/advisories/vde-2019-018


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Cleartext Transmission of Sensitive Information

EUVDB-ID: #VU23435

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-16672

CWE-ID: CWE-319 - Cleartext Transmission of Sensitive Information

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to software uses insecure communication channel to transmit sensitive information. A remote attacker with ability to intercept network traffic can gain access to credentials data.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

IE-SW-VL05M-5TX: 3.6.6

IE-SW-VL05MT-5TX: 3.6.6

IE-SW-VL05M-3TX-2SC: 3.6.6

IE-SW-VL05MT-3TX-2SC: 3.6.6

IE-SW-VL05M-3TX-2ST: 3.6.6

IE-SW-VL05MT-3TX-2ST: 3.6.6

IE-SW-VL08MT-8TX: 3.5.2

IE-SW-VL08MT-5TX-3SC: 3.5.2

IE-SW-VL08MT-5TX-1SC-2SCS: 3.5.2

IE-SW-VL08MT-6TX-2ST: 3.5.2

IE-SW-VL08MT-6TX-2SC: 3.5.2

IE-SW-VL08MT-6TX-2SCS: 3.5.2

IE-SW-PL08M-8TX: 3.3.8

IE-SW-PL08MT-8TX: 3.3.8

IE-SW-PL08M-6TX-2SC: 3.3.8

IE-SW-PL08MT-6TX-2SC: 3.3.8

IE-SW-PL08M-6TX-2ST: 3.3.8

IE-SW-PL08MT-6TX-2ST: 3.3.8

IE-SW-PL08M-6TX-2SCS: 3.3.8

IE-SW-PL08MT-6TX-2SCS: 3.3.8

IE-SW-PL10M-3GT-7TX: 3.3.16

IE-SW-PL10MT-3GT-7TX: 3.3.16

IE-SW-PL10M-1GT-2GS-7TX: 3.3.16

IE-SW-PL10MT-1GT-2GS-7TX: 3.3.16

IE-SW-PL16M-16TX: 3.4.2

IE-SW-PL16MT-16TX: 3.4.2

IE-SW-PL16M-14TX-2SC: 3.4.2

IE-SW-PL16MT-14TX-2SC: 3.4.2

IE-SW-PL16M-14TX-2ST: 3.4.2

IE-SW-PL16MT-14TX-2ST: 3.4.2

IE-SW-PL18M-2GC-16TX: 3.4.4

IE-SW-PL18MT-2GC-16TX: 3.4.4

IE-SW-PL18M-2GC14TX2SC: 3.4.4

IE-SW-PL18MT-2GC14TX2SC: 3.4.4

IE-SW-PL18M-2GC14TX2ST: 3.4.4

IE-SW-PL18MT-2GC14TX2ST: 3.4.4

IE-SW-PL18M-2GC14TX2SCS: 3.4.4

IE-SW-PL18MT-2GC14TX2SCS: 3.4.4

IE-SW-PL09M-5GC-4GT: 3.3.4

IE-SW-PL09MT-5GC-4GT: 3.3.4

External links

http://cert.vde.com/en-us/advisories/vde-2019-018


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Resource exhaustion

EUVDB-ID: #VU23434

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-16671

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation. A remote authenticated attacker can send a specially crafted packet, trigger resource exhaustion and cause a denial of service condition on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

IE-SW-VL05M-5TX: 3.6.6

IE-SW-VL05MT-5TX: 3.6.6

IE-SW-VL05M-3TX-2SC: 3.6.6

IE-SW-VL05MT-3TX-2SC: 3.6.6

IE-SW-VL05M-3TX-2ST: 3.6.6

IE-SW-VL05MT-3TX-2ST: 3.6.6

IE-SW-VL08MT-8TX: 3.5.2

IE-SW-VL08MT-5TX-3SC: 3.5.2

IE-SW-VL08MT-5TX-1SC-2SCS: 3.5.2

IE-SW-VL08MT-6TX-2ST: 3.5.2

IE-SW-VL08MT-6TX-2SC: 3.5.2

IE-SW-VL08MT-6TX-2SCS: 3.5.2

IE-SW-PL08M-8TX: 3.3.8

IE-SW-PL08MT-8TX: 3.3.8

IE-SW-PL08M-6TX-2SC: 3.3.8

IE-SW-PL08MT-6TX-2SC: 3.3.8

IE-SW-PL08M-6TX-2ST: 3.3.8

IE-SW-PL08MT-6TX-2ST: 3.3.8

IE-SW-PL08M-6TX-2SCS: 3.3.8

IE-SW-PL08MT-6TX-2SCS: 3.3.8

IE-SW-PL10M-3GT-7TX: 3.3.16

IE-SW-PL10MT-3GT-7TX: 3.3.16

IE-SW-PL10M-1GT-2GS-7TX: 3.3.16

IE-SW-PL10MT-1GT-2GS-7TX: 3.3.16

IE-SW-PL16M-16TX: 3.4.2

IE-SW-PL16MT-16TX: 3.4.2

IE-SW-PL16M-14TX-2SC: 3.4.2

IE-SW-PL16MT-14TX-2SC: 3.4.2

IE-SW-PL16M-14TX-2ST: 3.4.2

IE-SW-PL16MT-14TX-2ST: 3.4.2

IE-SW-PL18M-2GC-16TX: 3.4.4

IE-SW-PL18MT-2GC-16TX: 3.4.4

IE-SW-PL18M-2GC14TX2SC: 3.4.4

IE-SW-PL18MT-2GC14TX2SC: 3.4.4

IE-SW-PL18M-2GC14TX2ST: 3.4.4

IE-SW-PL18MT-2GC14TX2ST: 3.4.4

IE-SW-PL18M-2GC14TX2SCS: 3.4.4

IE-SW-PL18MT-2GC14TX2SCS: 3.4.4

IE-SW-PL09M-5GC-4GT: 3.3.4

IE-SW-PL09MT-5GC-4GT: 3.3.4

External links

http://cert.vde.com/en-us/advisories/vde-2019-018


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Improper Restriction of Excessive Authentication Attempts

EUVDB-ID: #VU23433

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-16670

CWE-ID: CWE-307 - Improper Restriction of Excessive Authentication Attempts

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to the system.

The vulnerability exists due to the authentication mechanism has no brute-force prevention. A remote attacker can launch a brute-force authentication attack and gain access to the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

IE-SW-VL05M-5TX: 3.6.6

IE-SW-VL05MT-5TX: 3.6.6

IE-SW-VL05M-3TX-2SC: 3.6.6

IE-SW-VL05MT-3TX-2SC: 3.6.6

IE-SW-VL05M-3TX-2ST: 3.6.6

IE-SW-VL05MT-3TX-2ST: 3.6.6

IE-SW-VL08MT-8TX: 3.5.2

IE-SW-VL08MT-5TX-3SC: 3.5.2

IE-SW-VL08MT-5TX-1SC-2SCS: 3.5.2

IE-SW-VL08MT-6TX-2ST: 3.5.2

IE-SW-VL08MT-6TX-2SC: 3.5.2

IE-SW-VL08MT-6TX-2SCS: 3.5.2

IE-SW-PL08M-8TX: 3.3.8

IE-SW-PL08MT-8TX: 3.3.8

IE-SW-PL08M-6TX-2SC: 3.3.8

IE-SW-PL08MT-6TX-2SC: 3.3.8

IE-SW-PL08M-6TX-2ST: 3.3.8

IE-SW-PL08MT-6TX-2ST: 3.3.8

IE-SW-PL08M-6TX-2SCS: 3.3.8

IE-SW-PL08MT-6TX-2SCS: 3.3.8

IE-SW-PL10M-3GT-7TX: 3.3.16

IE-SW-PL10MT-3GT-7TX: 3.3.16

IE-SW-PL10M-1GT-2GS-7TX: 3.3.16

IE-SW-PL10MT-1GT-2GS-7TX: 3.3.16

IE-SW-PL16M-16TX: 3.4.2

IE-SW-PL16MT-16TX: 3.4.2

IE-SW-PL16M-14TX-2SC: 3.4.2

IE-SW-PL16MT-14TX-2SC: 3.4.2

IE-SW-PL16M-14TX-2ST: 3.4.2

IE-SW-PL16MT-14TX-2ST: 3.4.2

IE-SW-PL18M-2GC-16TX: 3.4.4

IE-SW-PL18MT-2GC-16TX: 3.4.4

IE-SW-PL18M-2GC14TX2SC: 3.4.4

IE-SW-PL18MT-2GC14TX2SC: 3.4.4

IE-SW-PL18M-2GC14TX2ST: 3.4.4

IE-SW-PL18MT-2GC14TX2ST: 3.4.4

IE-SW-PL18M-2GC14TX2SCS: 3.4.4

IE-SW-PL18MT-2GC14TX2SCS: 3.4.4

IE-SW-PL09M-5GC-4GT: 3.3.4

IE-SW-PL09MT-5GC-4GT: 3.3.4

External links

http://cert.vde.com/en-us/advisories/vde-2019-018


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###