ENDRESS+HAUSER: Multiple Devices affected by fdtContainer vulnerability

Endress+Hauser DeviceCare SFE100, Field Xpert SMTxx (Software SFE300), FieldCare SFE500, Asset Health Monitoring SRP700 (Software FieldCare SFE500) affected by fdtContainer vulnerability

VDE-2021-005 (2021-03-01 08:39 UTC+0200)

CVE Identifier

CVE-2020-12525

Affected Vendors

Endress+Hauser

Affected Products

Order Code Product Name Affected Versions
SFE100 DeviceCare SFE100 <=1.07.00
SMT50, SMT70, SMT77 Field Xpert SMTxx (Software SFE300) <=1.05.00
SFE500 FieldCare SFE500 <=2.15.01
SRP700 Asset Health Monitoring SRP700 (Software FieldCare SFE500) <=2.15.01 (FieldCare SFE500)

Summary

The fdtCONTAINER component is integrated into an application (host application). The fdtCONTAINER application is a specific host application which integrates the fdtCONTAINER component.

The fdtCONTAINER component exchanges binary data blobs with such a host application. Typically, the host application saves these binary data blobs into a project storage (project file or a project database).

To manipulate the data inside the project storage, the attacker needs write access to this project storage. Additionally, the manipulated project needs to be opened by the host application. It depends on the host application whether opening the project requires a user action or not. In
fdtCONTAINER applications, the user has to open the manipulated project file manually.

In the case of opening a stored project, the deserialization of the manipulated data can be exploited.

Impact

The engineering workstation, on which the host application is executed, might execute malicious code with the user rights of the host application.

Solution

Temporary Fix/ Mitigation

  1. Exchange project data only via secure exchange services
  2. Use appropriate means to protect the project storage from unauthorized manipulation
  3. Do not open project data from an unknown source
  4. Reduce the user rights of the host application to the necessary minimum

Remediation

Remediation planned for future versions.

Reported by

M&M Software GmbH

Coordinated by CERT@VDE