Share: Email | Twitter

ID

VDE-2024-038

Published

2024-07-10 08:00 (CEST)

Last update

2024-07-10 09:35 (CEST)

Vendor(s)

Pepperl+Fuchs SE

Product(s)

Article No° Product Name Affected Version(s)
194233 OIT1500-F113-B12-CB <= V2.11.0
194231 OIT200-F113-B12-CB <= V2.11.0
194232 OIT500-F113-B12-CB <= V2.11.0
295845 OIT700-F113-B12-CB <= V2.11.0

Summary

Critical vulnerabilities has been discovered in the product, mainly caused by an
anonymous FTP server and Telnet access.
The impact of the vulnerabilities on the affected device may result in

  • Information disclosure
  • Denial of service
  • Device manipulation

Vulnerabilities



Last Update
Aug. 30, 2024, 9:21 a.m.
Weakness
Missing Authentication for Critical Function (CWE-306)
Summary

An unauthenticated remote attacker can manipulate the device via Telnet, stop processes, read, delete and change data.

Last Update
Sept. 2, 2024, 10:56 a.m.
Weakness
Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary

An unauthenticated remote attacker can read out sensitive device information through a incorrectly configured FTP service.

Impact

Pepperl+Fuchs analyzed and identified affected devices.
An attacker can

  • read out images, serial number of the device, version numbers of firmware and OS log-files, configuration
  • stop processes,
  • read out, delete and change data.

Solution

An external protective measure is required.

  • Minimize network exposure for affected products and ensure that they are not accessible via the Internet.
  • Isolate affected products from the corporate network.
  • If remote access is required, use secure methods such as virtual private networks (VPNs).

Reported by

CERT@VDE coordinated with Pepperl+Fuchs.

The vulnerabilities were reported by BMW AG.