Share: Email | Twitter

ID

VDE-2024-063

Published

2024-10-08 14:00 (CEST)

Last update

2024-10-07 11:14 (CEST)

Vendor(s)

Pepperl+Fuchs SE

Product(s)

Article No° Product Name Affected Version(s)
70123992-100000 VSE1000-F400-B12-A1000 < 1.15.0.0
70123992-100001 VSE2000-F400-B12-A1000 < 1.15.0.0
70123992-100002 VSE3000-F400-B12-A1000 < 1.15.0.0
70123993-100000 VTE7500-F400-B12-A1500 < 1.15.0.0

Summary

The affected devices run a SSH server that is affected by the regreSSHion vulnerability despite the fact that no user can actually log in through SSH. Attackers may exploit this vulnerability to gain root access to the device.


Last Update:

30. August 2024 09:21

Weakness

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')  (CWE-362) 

Summary

A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.


Impact

An unauthenticated remote attacker can

  • read files from the device
  • modify or delete data on the device
  • can interrupt the device functionality

Solution

Remediation

Update to the Firmware version 1.15.0.0.

A firmware update will be made available shortly on the corresponding product page on the Pepper+Fuchs Homepage.

Reported by

CERT@VDE coordinated with PEPPERL+FUCHS