ENDRESS+HAUSER: Ecograph T utilizing Webserver firmware version 2.x

Exposure of Sensitive Information to an Unauthorized Actor

VDE-2020-022 (2020-11-19 15:48 UTC+0100)

CVE Identifier

CVE-2020-12496

Affected Vendors

Endress+Hauser

Affected Products

RSG35
RSG45
Ecograph T
Memograph M
Firmware versions >= V2.0.0 (08/2015)
ORSG35
ORSG45
Ecograph T Neutral/Private Label
Memograph M Neutral/Private Label

Vulnerability Type

Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)

Summary

The firmware release has a dynamic token for each request submitted to the server, which makes repeating requests and analysis complex enough. Nevertheless, it's possible and during the analysis it was discovered that it also has an issue with the access-control matrix on the server-side.

Impact

It was found that a user with low rights can get information from endpoints that should not be available to this user.

Solution

Customers should configure a perimeter firewall to block traffic from untrusted networks and users to the device. These recommendations will be incorporated into the device documentation (operating instructions)
Change default password for operator, service and admin account.

Endress+Hauser will not change this behavior.
Customers are recommended to take the measures for Temporary Fix / Mitigation as described above.

Reported by

Maxim Rupp reported to CERT@VDE