Summary
Several vulnerabilities in the Endress+Hauser MEAC300-FNADE4 were discovered, that can be accessed via Ethernet.
Impact
If exploited, these vulnerabilities could potentially allow a remote, unauthenticated attacker to compromise the availability, integrity, and confidentiality of the MEAC300-FNADE4. Endress+Hauser recommends to update the product to the newest version and ensuring the product operates within a secure environment. Currently, Endress+Hauser is not aware of any exploits targeting these vulnerabilities.
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
Endress+Hauser MEAC300-FNADE4 all versions | Firmware <=0.16.0, Firmware vers:all/* |
Vulnerabilities
Expand / Collapse allThe application is vulnerable to SQL injection attacks. An attacker is able to dump the PostgreSQL database and read its content.
The MEAC300-FNADE4 does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.
The web application is susceptible to cross-site-scripting attacks. An attacker can create a prepared URL, which injects JavaScript code into the website. The code is executed in the victim’s browser when an authenticated administrator clicks the link.
The web application is susceptible to cross-site-scripting attacks. An attacker who can create new dashboards can inject JavaScript code into the dashboard name which will be executed when the website is loaded.
The Secure attribute is missing on multiple cookies provided by the MEAC300-FNADE4. An attacker can trick a user to establish an unencrypted HTTP connection to the server and intercept the request containing the PHPSESSID cookie.
The HttpOnly flag is set to false on the PHPSESSION cookie. Therefore, the cookie can be accessed by other sources such as JavaScript.
The configuration of the Apache httpd webserver which serves the MEAC300-FNADE4 web application, is partly insecure. There are modules activated that are not required for the operation of the FNADE4 web application. The functionality of the some modules
pose a risk to the webserver which enable dircetory listing.
For failed login attempts, the application returns different error messages depending on whether the login failed due to an incorrect password or a non-existing username. This allows an attacker to guess usernames until they find an existing one.
The application is vulnerable to cross-site request forgery. An attacker can trick a valid, logged in user into submitting a web request that they did not intend. The request uses the victim's browser's saved authorization to execute the request.
Mitigation
As general security measures, Endress+Hauser recommends to minimize network exposure of the devices, restrict
network access and follow recommended security practices in order to run the devices in a protected IT
environment.
Remediation
Customers are strongly advised to update to the newest version.
Revision History
Version | Date | Summary |
---|---|---|
1.0.0 | 03/06/2025 15:00 | Initial version |