Auto-Maskin DCU-210E RP-210E up to 3.7 on ARM7 Modbus Communication Messages origin validation
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
8.1 | $0-$5k | 0.00 |
A vulnerability has been found in Auto-Maskin DCU-210E RP-210E up to 3.7 on ARM7 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Modbus Communication Handler. The manipulation as part of a Messages leads to a origin validation vulnerability. The CWE definition for the vulnerability is CWE-346. The software does not properly verify that the source of data or communication is valid. As an impact it is known to affect confidentiality, integrity, and availability. The summary by CVE is:
The Auto-Maskin products utilize an undocumented custom protocol to set up Modbus communications with other devices without validating those devices. The originating device sends a message in plaintext, 48:65:6c:6c:6f:20:57:6f:72:6c:64, "Hello World" over UDP ports 44444-44446 to the broadcast address for the LAN. Without verification devices respond to any of these broadcast messages on the LAN with a plaintext reply over UDP containing the device model and firmware version. Following this exchange the devices allow Modbus transmissions between the two devices on the standard Modbus port 502 TCP. Impact: An attacker can exploit this vulnerability to send arbitrary messages to any DCU or RP device through spoofing or replay attacks as long as they have access to the network. Affected releases are Auto-Maskin DCU-210E RP-210E: Versions prior to 3.7 on ARMv7.
The bug was discovered 10/06/2018. The weakness was disclosed 10/08/2018 as confirmed advisory (CERT.org). The advisory is shared at kb.cert.org. This vulnerability is known as CVE-2018-5400 since 01/11/2018. The attack can only be done within the local network. The exploitation doesn't need any form of authentication. Neither technical details nor an exploit are publicly available.
The vulnerability was handled as a non-public zero-day exploit for at least 2 days. During that time the estimated underground price was around $0-$5k.
Proper firewalling of udp 44444-44446 is able to address this issue.
The entries 125076, 125078 and 125079 are pretty similar.
Product
Vendor
Name
CPE 2.3
CPE 2.2
CVSSv3
VulDB Meta Base Score: 8.2VulDB Meta Temp Score: 8.1
VulDB Base Score: 6.3
VulDB Temp Score: 6.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 9.1
NVD Vector: 🔍
CNA Base Score: 9.1
CNA Vector (CERT/CC): 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Origin validationCWE: CWE-346 / CWE-345
ATT&CK: Unknown
Local: No
Remote: Partially
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: FirewallStatus: 🔍
0-Day Time: 🔍
Firewalling: 🔍
Timeline
01/11/2018 🔍10/06/2018 🔍
10/08/2018 🔍
10/08/2018 🔍
10/09/2018 🔍
05/23/2023 🔍
Sources
Advisory: kb.cert.orgStatus: Confirmed
CVE: CVE-2018-5400 (🔍)
See also: 🔍
Entry
Created: 10/09/2018 08:42 AMUpdated: 05/23/2023 11:57 AM
Changes: 10/09/2018 08:42 AM (63), 03/31/2020 05:10 PM (1), 05/23/2023 11:57 AM (14)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.