Zurück zur Übersicht

Multiple vulnerabilities in Endress+Hauser MEAC300-FNADE4

VDE-2025-036
Last update
06.03.2025 15:00
Published at
06.03.2025 15:00
Vendor(s)
Endress+Hauser AG
External ID
VDE-2025-036
CSAF Document

Summary

Several vulnerabilities in the Endress+Hauser MEAC300-FNADE4 were discovered, that can be accessed via Ethernet.

Impact

If exploited, these vulnerabilities could potentially allow a remote, unauthenticated attacker to compromise the availability, integrity, and confidentiality of the MEAC300-FNADE4. Endress+Hauser recommends to update the product to the newest version and ensuring the product operates within a secure environment. Currently, Endress+Hauser is not aware of any exploits targeting these vulnerabilities.

Affected Product(s)

Model no. Product name Affected versions
Endress+Hauser MEAC300-FNADE4 all versions Firmware <=0.16.0, Firmware vers:all/*

Vulnerabilities

Expand / Collapse all

Published
22.09.2025 14:58
Weakness
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CWE-89)
Summary

The application is vulnerable to SQL injection attacks. An attacker is able to dump the PostgreSQL database and read its content.

References

Published
22.09.2025 14:58
Weakness
Missing Authorization (CWE-862)
References

Published
22.09.2025 14:58
Weakness
Cleartext Storage of Sensitive Information (CWE-312)
References

Published
22.09.2025 14:58
Weakness
Improper Restriction of Excessive Authentication Attempts (CWE-307)
References

Published
22.09.2025 14:58
Weakness
Improper Restriction of Excessive Authentication Attempts (CWE-307)
References

Published
22.09.2025 14:58
Weakness
Improper Restriction of Excessive Authentication Attempts (CWE-307)
Summary

The MEAC300-FNADE4 does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.

References

Published
22.09.2025 14:58
Weakness
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79)
Summary

The web application is susceptible to cross-site-scripting attacks. An attacker can create a prepared URL, which injects JavaScript code into the website. The code is executed in the victim’s browser when an authenticated administrator clicks the link.

References

Published
22.09.2025 14:58
Weakness
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79)
Summary

The web application is susceptible to cross-site-scripting attacks. An attacker who can create new dashboards can inject JavaScript code into the dashboard name which will be executed when the website is loaded.

References

Published
22.09.2025 14:58
Weakness
Plaintext Storage of a Password (CWE-256)
References

Published
22.09.2025 14:58
Weakness
Use of a Broken or Risky Cryptographic Algorithm (CWE-327)
References

Published
22.09.2025 14:58
Weakness
Cleartext Transmission of Sensitive Information (CWE-319)
References

Published
22.09.2025 14:58
Weakness
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute (CWE-614)
Summary

The Secure attribute is missing on multiple cookies provided by the MEAC300-FNADE4. An attacker can trick a user to establish an unencrypted HTTP connection to the server and intercept the request containing the PHPSESSID cookie.

References

Published
22.09.2025 14:58
Weakness
Sensitive Cookie Without 'HttpOnly' Flag (CWE-1004)
Summary

The HttpOnly flag is set to false on the PHPSESSION cookie. Therefore, the cookie can be accessed by other sources such as JavaScript.

References

Published
22.09.2025 14:58
Weakness
Exposure of Information Through Directory Listing (CWE-548)
Summary

The configuration of the Apache httpd webserver which serves the MEAC300-FNADE4 web application, is partly insecure. There are modules activated that are not required for the operation of the FNADE4 web application. The functionality of the some modules
pose a risk to the webserver which enable dircetory listing.

References

Published
22.09.2025 14:58
Weakness
Observable Response Discrepancy (CWE-204)
Summary

For failed login attempts, the application returns different error messages depending on whether the login failed due to an incorrect password or a non-existing username. This allows an attacker to guess usernames until they find an existing one.

References

Published
22.09.2025 14:58
Weakness
Storing Passwords in a Recoverable Format (CWE-257)
References

Published
22.09.2025 14:58
Weakness
Use of Default Credentials (CWE-1392)
References

Published
22.09.2025 14:58
Weakness
Improper Restriction of Rendered UI Layers or Frames (CWE-1021)
References

Published
22.09.2025 14:58
Weakness
Cross-Site Request Forgery (CSRF) (CWE-352)
Summary

The application is vulnerable to cross-site request forgery. An attacker can trick a valid, logged in user into submitting a web request that they did not intend. The request uses the victim's browser's saved authorization to execute the request.

References

Mitigation

As general security measures, Endress+Hauser recommends to minimize network exposure of the devices, restrict
network access and follow recommended security practices in order to run the devices in a protected IT
environment.

Remediation

Customers are strongly advised to update to the newest version.

Revision History

Version Date Summary
1.0.0 06.03.2025 15:00 Initial version