TECSON/GOK Improper Authentication and Access Control on multiple devices

The vulnerability allows attackers to modify Tecson/GOK devices of type LX-Net, LX-Q-Net, e-litro net, SmartBox4 LAN and SmartBox4 pro LAN with improper authentication and access control.

VDE-2019-012 (2019-06-04 16:21 UTC+0200)

CVE Identifier

CVE-2019-12254

Affected Vendors

Tecson, GOK

Affected Products

LX-Net
LX-Q-Net
e-litro net
SmartBox 4 LAN
SmartBox 4 LAN PRO

Vulnerability Type

Improper Authentication and Access Control (CWE-287)

Summary

A security researcher discovered that the affected application doesn't properly restrict access to an endpoint that is responsible for saving settings, to a user with limited access rights. Based on the lack of adequately implemented access-control rules, by accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to change the application settings without authenticating at all, which violates originally laid ACL rules.

Impact

This issue allows changing the configuration and get full access to the web-based configuration interface of the device wich includes all settings like passwords, alerting parameters and output states. That can adversely affect the planned operation of the equipment or can aid in further attacks on the industrial control process.

Solution

Temporary Fix / Mitigation:

In secure environments disable port forwarding and remote access to the device otherwise disable network access completely.

Solution:

Update the device to firmware V6.3.x or later to fix the vulnerability.

Reported by

Maxim Rupp (rupp.it), coordinated by CERT@VDE (cert.vde.com)