Multiple vulnerabilities in Hitachi Energy FOXMAN-UN



Published: 2023-01-06
Risk Low
Patch available YES
Number of vulnerabilities 5
CVE-ID CVE-2021-40341
CVE-2021-40342
CVE-2022-3927
CVE-2022-3928
CVE-2022-3929
CWE-ID CWE-326
CWE-310
CWE-321
CWE-319
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
FOXMAN-UN R16A
Server applications / Other server solutions

FOXMAN-UN R15B
Server applications / Other server solutions

FOXMAN-UN R15A
Server applications / Other server solutions

FOXMAN-UN R14B
Server applications / Other server solutions

FOXMAN-UN R14A
Server applications / Other server solutions

FOXMAN-UN R11B
Server applications / Other server solutions

FOXMAN-UN R11A
Server applications / Other server solutions

FOXMAN-UN R10C
Server applications / Other server solutions

FOXMAN-UN R9C
Server applications / Other server solutions

Vendor Hitachi Energy

Security Bulletin

This security bulletin contains information about 5 vulnerabilities.

1) Inadequate Encryption Strength

EUVDB-ID: #VU70765

Risk: Low

CVSSv3.1: 6.2 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-40341

CWE-ID: CWE-326 - Inadequate Encryption Strength

Exploit availability: No

Description

The vulnerability allows a local attacker to compromise the target system.

The vulnerability exists due to inadequate encryption strength within the DES cypher. A local attacker can decrypt the cypher in a short time.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

FOXMAN-UN R16A: All versions

FOXMAN-UN R15B: All versions

FOXMAN-UN R15A: All versions

FOXMAN-UN R14B: All versions

FOXMAN-UN R14A: All versions

FOXMAN-UN R11B: All versions

FOXMAN-UN R11A: All versions

FOXMAN-UN R10C: All versions

FOXMAN-UN R9C: All versions

External links

http://search.abb.com/library/Download.aspx?DocumentID=8DBD000083&LanguageCode=en&DocumentPartId=&Action=Launch
http://www.cisa.gov/uscert/ics/advisories/icsa-23-005-02


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Cryptographic issues

EUVDB-ID: #VU70767

Risk: Low

CVSSv3.1: 6.2 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-40342

CWE-ID: CWE-310 - Cryptographic Issues

Exploit availability: No

Description

The vulnerability allows a local attacker to compromise the target system.

The vulnerability exists due to the affected products use a DES implementation with a default key for encryption. A local attacker can obtain sensitive information and gain access to network elements managed by the FOXMAN-UN.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

FOXMAN-UN R16A: All versions

FOXMAN-UN R15B: All versions

FOXMAN-UN R15A: All versions

FOXMAN-UN R14B: All versions

FOXMAN-UN R14A: All versions

FOXMAN-UN R11B: All versions

FOXMAN-UN R11A: All versions

FOXMAN-UN R10C: All versions

FOXMAN-UN R9C: All versions

External links

http://search.abb.com/library/Download.aspx?DocumentID=8DBD000083&LanguageCode=en&DocumentPartId=&Action=Launch
http://www.cisa.gov/uscert/ics/advisories/icsa-23-005-02


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Use of Hard-coded Cryptographic Key

EUVDB-ID: #VU70768

Risk: Low

CVSSv3.1: 7 [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-3927

CWE-ID: CWE-321 - Use of Hard-coded Cryptographic Key

Exploit availability: No

Description

The vulnerability allows a remote user to compromise the target system.

The vulnerability exists due to the affected products contain public and private keys used to sign and protect custom parameter set (CPS) files from modification. A remote administrator can change the CPS file and sign it, so it is trusted as a legitimate CPS file.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

FOXMAN-UN R16A: All versions

FOXMAN-UN R15B: All versions

FOXMAN-UN R15A: All versions

FOXMAN-UN R14B: All versions

FOXMAN-UN R14A: All versions

FOXMAN-UN R11B: All versions

FOXMAN-UN R11A: All versions

FOXMAN-UN R10C: All versions

FOXMAN-UN R9C: All versions

External links

http://search.abb.com/library/Download.aspx?DocumentID=8DBD000083&LanguageCode=en&DocumentPartId=&Action=Launch
http://www.cisa.gov/uscert/ics/advisories/icsa-23-005-02


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Use of Hard-coded Cryptographic Key

EUVDB-ID: #VU70769

Risk: Low

CVSSv3.1: 6.2 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-3928

CWE-ID: CWE-321 - Use of Hard-coded Cryptographic Key

Exploit availability: No

Description

The vulnerability allows a local attacker to compromise the target system.

The vulnerability exists due to the message queue contains a hard-coded credential. A local attacker can access data from the internal message queue.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

FOXMAN-UN R16A: All versions

FOXMAN-UN R15B: All versions

FOXMAN-UN R15A: All versions

FOXMAN-UN R14B: All versions

FOXMAN-UN R14A: All versions

FOXMAN-UN R11B: All versions

FOXMAN-UN R11A: All versions

FOXMAN-UN R10C: All versions

FOXMAN-UN R9C: All versions

External links

http://search.abb.com/library/Download.aspx?DocumentID=8DBD000083&LanguageCode=en&DocumentPartId=&Action=Launch
http://www.cisa.gov/uscert/ics/advisories/icsa-23-005-02


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Cleartext transmission of sensitive information

EUVDB-ID: #VU70770

Risk: Low

CVSSv3.1: 5.3 [CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-3929

CWE-ID: CWE-319 - Cleartext Transmission of Sensitive Information

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to software uses common object request broker architecture CORBA (CORBA) to transmit sensitive information. A remote attacker with ability to intercept network traffic can gain trace internal messages.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

FOXMAN-UN R16A: All versions

FOXMAN-UN R15B: All versions

FOXMAN-UN R15A: All versions

FOXMAN-UN R14B: All versions

FOXMAN-UN R14A: All versions

FOXMAN-UN R11B: All versions

FOXMAN-UN R11A: All versions

FOXMAN-UN R10C: All versions

FOXMAN-UN R9C: All versions

External links

http://search.abb.com/library/Download.aspx?DocumentID=8DBD000083&LanguageCode=en&DocumentPartId=&Action=Launch
http://www.cisa.gov/uscert/ics/advisories/icsa-23-005-02


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###