Multiple vulnerabilities in General Electric Renewable Energy MDS Radios



Published: 2022-04-04
Risk High
Patch available YES
Number of vulnerabilities 5
CVE-ID CVE-2022-24119
CVE-2022-24116
CVE-2022-24118
CVE-2022-24120
CVE-2022-24117
CWE-ID CWE-912
CWE-326
CWE-400
CWE-256
CWE-494
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
iNET
Hardware solutions / Firmware

iNET II
Hardware solutions / Firmware

TD220X
Hardware solutions / Firmware

TD220MAX
Hardware solutions / Firmware

SD series radio firmware
Hardware solutions / Firmware

Vendor

Security Bulletin

This security bulletin contains information about 5 vulnerabilities.

1) Hidden functionality

EUVDB-ID: #VU61817

Risk: High

CVSSv3.1: 8.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-24119

CWE-ID: CWE-912 - Hidden Functionality (Backdoor)

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system

The vulnerability exists due to hidden functionality (backdoor) is present in software. A remote attacker can use this functionality to gain full access to the application and compromise the affected system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

iNET: before 8.3.0

iNET II: before 8.3.0

External links

http://ics-cert.us-cert.gov/advisories/icsa-22-090-06


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Inadequate Encryption Strength

EUVDB-ID: #VU61818

Risk: Medium

CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-24116

CWE-ID: CWE-326 - Inadequate Encryption Strength

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to inadequate encryption strength in the wireless security software and chipset implementations. A remote attacker on the local network can gain access to the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

iNET: before 8.3.0

iNET II: before 8.3.0

External links

http://ics-cert.us-cert.gov/advisories/icsa-22-090-06


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Resource exhaustion

EUVDB-ID: #VU61819

Risk: Medium

CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-24118

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources. A remote attacker on the local network can use the authentication code to cause affected series radios to reset back to the factory default configuration and reboot.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

iNET: before 8.3.0

iNET II: before 8.3.0

TD220X: before 2.0.16

TD220MAX: before 1.2.6

SD series radio firmware: before 6.4.7

External links

http://ics-cert.us-cert.gov/advisories/icsa-22-090-06


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Unprotected storage of credentials

EUVDB-ID: #VU61820

Risk: Low

CVSSv3.1: 5.9 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-24120

CWE-ID: CWE-256 - Unprotected Storage of Credentials

Exploit availability: No

Description

The vulnerability allows a local attacker to gain access to other users' credentials.

The vulnerability exists due to application stored credentials in plain text in a configuration file on the system. An attacker with physical access can view contents of the configuration file and gain access to passwords for 3rd party integration.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

iNET: before 8.3.0

iNET II: before 8.3.0

External links

http://ics-cert.us-cert.gov/advisories/icsa-22-090-06


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Download of code without integrity check

EUVDB-ID: #VU61821

Risk: Low

CVSSv3.1: 7.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-24117

CWE-ID: CWE-494 - Download of Code Without Integrity Check

Exploit availability: No

Description

The vulnerability allows a remote user to compromise the affected system

The vulnerability exists due to software does not perform software integrity check when downloading updates. A remote administrator gain full control over the affected system after a successful software update.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

iNET: before 8.3.0

iNET II: before 8.3.0

SD series radio firmware: before 6.4.7

TD220X: before 2.0.16

TD220MAX: before 1.2.6

External links

http://ics-cert.us-cert.gov/advisories/icsa-22-090-06


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###