#VU13122 Improper authentication in MDS PulseNET Enterprise and GE MDS PulseNET


Published: 2018-05-31 | Updated: 2018-06-01

Vulnerability identifier: #VU13122

Vulnerability risk: High

CVSSv3.1: 8.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-10611

CWE-ID: CWE-287

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
MDS PulseNET Enterprise
Web applications / Remote management & hosting panels
GE MDS PulseNET
Web applications / Remote management & hosting panels

Vendor: GE

Description

The vulnerability allows a remote attacker to bypass authentication on the target system.

The vulnerability exists due to an error in Java Remote Method Invocation (RMI) input port. A remote unauthenticated attacker can bypass authentication and launch applications to support remote code execution through Web Services.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

MDS PulseNET Enterprise: All versions

GE MDS PulseNET: All versions


External links
http://ics-cert.us-cert.gov/advisories/ICSA-18-151-02


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability