GE Fixes Credential Vulnerability

Friday, June 3, 2016 @ 02:06 PM gHale


GE created new firmware versions to mitigate a hard-coded credential vulnerability in its MultiLink series managed switches, according to a report on ICS-CERT.

This vulnerability, discovered by GE, is remotely exploitable.

RELATED STORIES
Moxa Issue on Discontinued Product
ABB Fixes PCM600 Vulnerabilities
ESC Data Controllers Vulnerabilities
Sixnet Fixes Hard-Coded Credentials Issue

The following MultiLink products suffer from the issue:
• GE ML800 Switch, firmware versions prior to Version 5.5.0
• GE ML810 Switch, firmware versions prior to Version 5.5.0k
• GE ML1200 Switch, firmware versions prior to Version 5.5.0
• GE ML1600 Switch, firmware versions prior to Version 5.5.0
• GE ML2400 Switch, firmware versions prior to Version 5.5.0
• GE ML3000 Switch, firmware versions prior to Version 5.5.0k
• GE ML3100 Switch, firmware versions prior to Version 5.5.0k

Exploitation of this vulnerability may allow an attacker to gain unauthorized administrative access to device configurations resulting in exposure and control of all configuration options available through the web interface.

GE is a U.S.-based company that maintains offices in several countries around the world.

The affected products, Multilink series switches, are managed Ethernet switches designed specifically for use in industrial facilities, substations, and transportation environments. The Multilink series switches see use across several sectors including critical manufacturing, energy, and water and wastewater systems. GE said these products see use on a global basis.

The Multilink series switches have a hard-coded credential vulnerability, which could allow unauthorized administrative access to device configuration options available through the web interface.

CVE-2016-2310 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 10.

No known public exploits specifically target this vulnerability. An attacker with a low skill would be able to exploit this vulnerability.

GE released new firmware versions for the MultiLink series managed switches that resolve the identified vulnerability.

GE recommends asset owners install firmware upgrades on affected devices. Firmware Version 5.5.0 resolves the vulnerability for the ML800, ML1200, ML1600, and ML2400. Firmware Version 5.5.0k resolves the vulnerability for the ML810, ML3000, and ML3100.

Click here for the new firmware version for the ML800 switch, Version 5.5.0.

Click here for the new firmware version for the ML810 switch, Version 5.5.0k.

Click here for the new firmware version for the ML1200 switch, Version 5.5.0.

Click here for the new firmware version for the ML1600 switch, Version 5.5.0.

Click here for the new firmware version for the ML2400 switch, Version 5.5.0.

Click here for the new firmware version for the ML3000 and ML3100 switches, Version 5.5.0k.