Summary
The firmware release has a dynamic token for each request submitted to the server, which makes repeating requests and analysis complex enough. Nevertheless, it's possible and during the analysis it was discovered that it also has an issue with the access-control matrix on the server-side.
Impact
It was found that a user with low rights can get information from endpoints that should not be available to this user.
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
RSG35 | Endress+Hauser Hardware Ecograph T | Firmware >=V2.0.0 (08/2015) |
ORSG35 | Endress+Hauser Hardware Ecograph T Neutral/Private Label | Firmware >=V2.0.0 (08/2015) |
RSG45 | Endress+Hauser Hardware Memograph M | Firmware >=V2.0.0 (08/2015) |
ORSG45 | Endress+Hauser Hardware Memograph M Neutral/Private Label | Firmware >=V2.0.0 (08/2015) |
Vulnerabilities
Expand / Collapse allEndress+Hauser Ecograph T (Neutral/Private Label) (RSG35, ORSG35) and Memograph M (Neutral/Private Label) (RSG45, ORSG45) with Firmware version V2.0.0 and above is prone to exposure of sensitive information to an unauthorized actor. The firmware release has a dynamic token for each request submitted to the server, which makes repeating requests and analysis complex enough. Nevertheless, it's possible and during the analysis it was discovered that it also has an issue with the access-control matrix on the server-side. It was found that a user with low rights can get information from endpoints that should not be available to this user.
Mitigation
Customers should configure a perimeter firewall to block traffic from untrusted networks and users to the device. These recommendations will be incorporated into the device documentation (operating instructions)
Change default password for operator, service and admin account.
Endress+Hauser will not change this behavior.
Customers are recommended to take the measures for Temporary Fix / Mitigation as described above.
Revision History
Version | Date | Summary |
---|---|---|
1 | 11/19/2020 15:48 | Initial revision. |
2 | 11/06/2024 12:27 | Fix: correct certvde domain, added alias, added self-reference |
3 | 04/11/2025 09:00 | Fix: version range |
4 | 05/14/2025 15:00 | Fix: added distribution |