Share: Email | Twitter

ID

VDE-2025-036

Published

2025-07-03 08:00 (CEST)

Last update

2025-06-27 11:15 (CEST)

Vendor(s)

Endress+Hauser AG

Product(s)

Article No° Product Name Affected Version(s)
MEAC300-FNADE4 <= 0.16.0

Summary

Several vulnerabilities in the Endress+Hauser MEAC300-FNADE4 were discovered, that can be accessed via Ethernet.

Vulnerabilities



Last Update
26. Juni 2025 15:18
Weakness
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CWE-89)
Summary

The application is vulnerable to SQL injection attacks. An attacker is able to dump the PostgreSQL database and read its content.

Details
SICK 
Last Update
26. Juni 2025 15:41
Weakness
Missing Authorization (CWE-862)
Summary

During startup, the device automatically logs in the EPC2 Windows user without requesting a password.

Details
SICK 
Last Update
26. Juni 2025 15:40
Weakness
Cleartext Storage of Sensitive Information (CWE-312)
Summary

The hard drives of the device are not encrypted using a full volume encryption feature such as BitLocker. This allows an attacker with physical access to the device to use an alternative operating system to interact with the hard drives, completely circumventing the Windows login. The attacker can read from and write to all files on the hard drives.

Details
SICK 
Last Update
26. Juni 2025 15:18
Weakness
Improper Restriction of Excessive Authentication Attempts (CWE-307)
Summary

The MEAC300-FNADE4 does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.

Details
SICK 
Last Update
26. Juni 2025 15:44
Weakness
Improper Restriction of Excessive Authentication Attempts (CWE-307)
Summary

The maxView Storage Manager does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.

Details
SICK 
Last Update
26. Juni 2025 15:34
Weakness
Improper Restriction of Excessive Authentication Attempts (CWE-307)
Summary

The SMB server's login mechanism does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.

Details
SICK 
Last Update
26. Juni 2025 15:19
Weakness
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79)
Summary

The web application is susceptible to cross-site-scripting attacks. An attacker can create a prepared URL, which injects JavaScript code into the website. The code is executed in the victim’s browser when an authenticated administrator clicks the link.

Details
SICK 
Last Update
26. Juni 2025 15:21
Weakness
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79)
Summary

The web application is susceptible to cross-site-scripting attacks. An attacker who can create new dashboards can inject JavaScript code into the dashboard name which will be executed when the website is loaded.

Details
SICK 
Last Update
26. Juni 2025 15:37
Weakness
Use of a Broken or Risky Cryptographic Algorithm (CWE-327)
Summary

The VNC authentication mechanism bases on a challenge-response system where both server and client use the same password for encryption. The challenge is sent from the server to the client, is encrypted by the client and sent back. The server does the same encryption locally and if the responses match it is prooven that the client knows the correct password. Since all VNC communication is unencrypted, an attacker can obtain the challenge and response and try to derive the password from this information.

Details
SICK 
Last Update
26. Juni 2025 15:24
Weakness
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute (CWE-614)
Summary

The Secure attribute is missing on multiple cookies provided by the MEAC300-FNADE4. An attacker can trick a user to establish an unencrypted HTTP connection to the server and intercept the request containing the PHPSESSID cookie.

Details
SICK 
Last Update
26. Juni 2025 15:43
Weakness
Plaintext Storage of a Password (CWE-256)
Summary

Several credentials for the local PostgreSQL database are stored in plain text (partially base64 encoded).

Details
SICK 
Last Update
26. Juni 2025 15:35
Weakness
Cleartext Transmission of Sensitive Information (CWE-319)
Summary

All communication between the VNC server and client(s) is unencrypted. This allows an attacker to intercept the traffic and obtain sensitive data.

Details
SICK 
Last Update
26. Juni 2025 15:26
Weakness
Observable Response Discrepancy (CWE-204)
Summary

For failed login attempts, the application returns different error messages depending on whether the login failed due to an incorrect password or a non-existing username. This allows an attacker to guess usernames until they find an existing one.

Details
SICK 
Last Update
26. Juni 2025 15:31
Weakness
Sensitive Cookie Without 'HttpOnly' Flag (CWE-1004)
Summary

The HttpOnly flag is set to false on the PHPSESSION cookie. Therefore, the cookie can be accessed by other sources such as JavaScript.

Details
SICK 
Last Update
26. Juni 2025 15:28
Weakness
Exposure of Information Through Directory Listing (CWE-548)
Summary

The configuration of the Apache httpd webserver which serves the MEAC300-FNADE4 web application, is partly insecure. There are modules activated that are not required for the operation of the FNADE4 web application. The functionality of the some modules pose a risk to the webserver which enable dircetory listing.

Details
SICK 
Last Update
26. Juni 2025 15:38
Weakness
Storing Passwords in a Recoverable Format (CWE-257)
Summary

The VNC application stores its passwords encrypted within the registry but uses DES for encryption. As DES is broken, the original passwords can be recovered.

Details
SICK 
Last Update
26. Juni 2025 15:46
Weakness
Use of Default Credentials (CWE-1392)
Summary

Multiple services of the DUT as well as different scopes of the same service reuse the same credentials.

Details
SICK 
Last Update
26. Juni 2025 15:32
Weakness
Cross-Site Request Forgery (CSRF) (CWE-352)
Summary

The application is vulnerable to cross-site request forgery. An attacker can trick a valid, logged in user into submitting a web request that they did not intend. The request uses the victim's browser's saved authorization to execute the request.

Details
SICK 
Last Update
26. Juni 2025 15:33
Weakness
Improper Restriction of Rendered UI Layers or Frames (CWE-1021)
Summary

The web application is vulnerable to clickjacking attacks. The site can be embedded into another frame, allowing an attacker to trick a user into clicking on something different from what the user perceives, thus potentially revealing confidential information or allowing others to take control of their computer while clicking on seemingly innocuous objects.

Details
SICK 

Impact

If exploited, these vulnerabilities could potentially allow a remote, unauthenticated attacker to compromise the availability, integrity, and confidentiality of the MEAC300-FNADE4. Endress+Hauser recommends to update the product to the newest version and ensuring the product operates within a secure environment. Currently, Endress+Hauser is not aware of any exploits targeting these vulnerabilities.

Solution

Mitigation

As general security measures, Endress+Hauser recommends to minimize network exposure of the devices, restrict network access and follow recommended security practices in order to run the devices in a protected IT environment.

Remediation

Customers are strongly advised to update to the newest version.

Reported by

CERT@VDE coordinated with Endress+Hauser