Share: Email | Twitter

ID

VDE-2018-016

Published

2018-10-19 08:39 (CEST)

Last update

2018-10-19 08:39 (CEST)

Vendor(s)

Pepperl+Fuchs SE

Product(s)

Article No° Product Name Affected Version(s)
CT50-Ex, Android 4.4, CommonES < 3.17.3445
CT50-Ex, Android 6.0, CommonES < 4.01.00.4134
CT50-Ex, Android 6.0, ECP < 2.30.00.0167

Summary

An attacker may gain access (by elevated privileges) to CT50-Ex mobile computers through a vulnerability in a system service running the Android Operating System (OS). The system service improperly validates incoming connection requests. Although the vulnerability is significant, currently no known exploits publicly available. 


Last Update:

Feb. 18, 2020, 7:56 a.m.

Weakness

Improper Privilege Management  (CWE-269) 

Summary

On Honeywell Mobile Computers (CT60 running Android OS 7.1, CN80 running Android OS 7.1, CT40 running Android OS 7.1, CK75 running Android OS 6.0, CN75 running Android OS 6.0, CN75e running Android OS 6.0, CT50 running Android OS 6.0, D75e running Android OS 6.0, CT50 running Android OS 4.4, D75e running Android OS 4.4, CN51 running Android OS 6.0, EDA50k running Android 4.4, EDA50 running Android OS 7.1, EDA50k running Android OS 7.1, EDA70 running Android OS 7.1, EDA60k running Android OS 7.1, and EDA51 running Android OS 8.1), a skilled attacker with advanced knowledge of the target system could exploit this vulnerability by creating an application that would successfully bind to the service and gain elevated system privileges. This could enable the attacker to obtain access to keystrokes, passwords, personal identifiable information, photos, emails, or business-critical documents.

Impact

A skilled attacker with advanced knowledge of the target system could exploit this vulnerability by creating an application that would successfully bind to the service and gain elevated system privileges. This may enable the attacker to obtain access to keystrokes, passwords, personal identifiable information, photos, emails, or business-critical documents.

Solution

An update is available that resolves this vulnerability. All customers using the impacted products should update their products as indicated in the chart below. Only products listed below are affected by this vulnerability. Updates are available via the Pepperl+Fuchs / ecom product support channel or directly from the original manufacturer Honeywell at https://hsmftp.honeywell.com .

Pepperl+Fuchs strongly recommends that users upgrade to the version identified below to resolve the vulnerability.

Product

Software

Status

CT50-Ex

Android 6.0

Update to CommonES 4.01.00.4134 or later
Update ECP to version 2.30.00.0167 or later (if applicable)

Android 4.4

Update to CommonES 3.17.3445 or later

For support, please contact your local Pepperl+Fuchs sales representative.

Reported by