Share: Email | Twitter

ID

VDE-2025-011

Published

2025-05-26 10:00 (CEST)

Last update

2025-05-23 11:11 (CEST)

Vendor(s)

Pepperl+Fuchs SE

Product(s)

Article No° Product Name Affected Version(s)
Profinet Gateway FB8122A.1.EL < V1.3.13
Profinet Gateway LB8122A.1.EL < V1.3.13

Summary

A stored cross-site scripting vulnerability has been discovered in the profinet gateway LB8122A.1.EL. An attacker can write an HTML tag with up to 32 characters in the message field of a HART transmitter. The HTML tag is interpreted as HTML when the HART information is displayed in a webbrowser. If the HTML tag contains a link to a manipulated page, a user can be tricked into accessing this page. Furthermore, an attacker can access information about running processes via the SNMP protocol. Sending such SNMP read commands can also trigger a reboot.

Vulnerabilities



Last Update
23. Mai 2025 11:06
Weakness
Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary

An unauthenticated remote attacker can access information about running processes via the SNMP protocol. The amount of returned data can trigger a reboot by the watchdog.

Details
certvde.com 
Last Update
23. Mai 2025 11:07
Weakness
Missing Authentication for Critical Function (CWE-306)
Summary

An unauthenticated remote attacker can access a URL which causes the device to reboot.

Details
certvde.com 
Last Update
23. Mai 2025 11:05
Weakness
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79)
Summary

Due to improper neutralization of input during web page generation (XSS) an unauthenticated remote attacker can inject HTML code into the Web-UI in the affected device.

Details
certvde.com 

Impact

An unauthenticated attacker can use a stored HTML link in a HART transmitter to redirect a user to a manipulated website. From there, he can manipulate the user's device or environment. An attacker can collect information via SNMP to launch attacks. Sending the read commands can trigger a reboot of the device.

Solution

Mitigation

The web server is switched off by default and can only be switched on via the gateway display. It is then active for 5 minutes and switches itself off again.

  • Ensure that only authorized personnel have access to the gateway.
  • Only use the gateway in an isolated network environment.

Remediation

Please install the updated firmware V1.3.13.

Reported by

CERT@VDE coordinated with PEPPERL+FUCHS