Vulnerability identifier: #VU57
Vulnerability risk: High
CVSSv4.0: 7.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/U:Amber]
CVE-ID:
CWE-ID:
CWE-264
Exploitation vector: Network
Exploit availability: Yes
Vulnerable software:
IMS-LANTIME M1000
Other software /
Other software solutions
IMS-LANTIME M500
Other software /
Other software solutions
LANTIME M900
Other software /
Other software solutions
LANTIME M600
Other software /
Other software solutions
LANTIME M400
Other software /
Other software solutions
LANTIME M200
Other software /
Other software solutions
LANTIME M100
Other software /
Other software solutions
SyncFire 1100
Other software /
Other software solutions
LCES
Other software /
Other software solutions
Vendor: Meinberg radio clocks GmbH & Co. KG
Description
The vulnerability allows a remote attacker to execute privilage escalation.
The vulnerability exists due to weak access controls, that allow for privilege escalation from “nobody” to “root” user. “nobody” has permissions to alter script that can only run as “root.”
Successful exploitation of this vulnerability may result in escalation to root privileges.
Mitigation
Meinberg has produced a new firmware Version 6.20.004.
Vulnerable software versions
IMS-LANTIME M1000: 6.0
IMS-LANTIME M500: 6.0
LANTIME M900 : 6.0
LANTIME M600 : 6.0
LANTIME M400: 6.0
LANTIME M200: 6.0
LANTIME M100: 6.0
SyncFire 1100: 6.0
LCES: 6.0
External links
https://ics-cert.us-cert.gov/advisories/ICSA-16-175-03
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.