Back to overview

Endress+Hauser: Ecograph T utilizing Webserver firmware version 2.x exposes sensitive information

VDE-2020-022
Last update
05/14/2025 15:00
Published at
11/19/2020 15:48
Vendor(s)
Endress+Hauser AG
External ID
VDE-2020-022
CSAF Document

Summary

The firmware release has a dynamic token for each request submitted to the server, which makes repeating requests and analysis complex enough. Nevertheless, it's possible and during the analysis it was discovered that it also has an issue with the access-control matrix on the server-side.

Impact

It was found that a user with low rights can get information from endpoints that should not be available to this user.

Affected Product(s)

Model no. Product name Affected versions
RSG35 Endress+Hauser Hardware Ecograph T Firmware >=V2.0.0 (08/2015)
ORSG35 Endress+Hauser Hardware Ecograph T Neutral/Private Label Firmware >=V2.0.0 (08/2015)
RSG45 Endress+Hauser Hardware Memograph M Firmware >=V2.0.0 (08/2015)
ORSG45 Endress+Hauser Hardware Memograph M Neutral/Private Label Firmware >=V2.0.0 (08/2015)

Vulnerabilities

Expand / Collapse all

Published
09/22/2025 14:58
Weakness
Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary

Endress+Hauser Ecograph T (Neutral/Private Label) (RSG35, ORSG35) and Memograph M (Neutral/Private Label) (RSG45, ORSG45) with Firmware version V2.0.0 and above is prone to exposure of sensitive information to an unauthorized actor. The firmware release has a dynamic token for each request submitted to the server, which makes repeating requests and analysis complex enough. Nevertheless, it's possible and during the analysis it was discovered that it also has an issue with the access-control matrix on the server-side. It was found that a user with low rights can get information from endpoints that should not be available to this user.

References

Mitigation

Customers should configure a perimeter firewall to block traffic from untrusted networks and users to the device. These recommendations will be incorporated into the device documentation (operating instructions)
Change default password for operator, service and admin account.

Endress+Hauser will not change this behavior.
Customers are recommended to take the measures for Temporary Fix / Mitigation as described above.

Revision History

Version Date Summary
1 11/19/2020 15:48 Initial revision.
2 11/06/2024 12:27 Fix: correct certvde domain, added alias, added self-reference
3 04/11/2025 09:00 Fix: version range
4 05/14/2025 15:00 Fix: added distribution