KMC Controls Clears Router Holes

Wednesday, June 8, 2016 @ 11:06 AM gHale


KMC Controls created new firmware to mitigate authentication and cross-site request forgery (CSRF) vulnerabilities in its Conquest BACnet routers through its web interface, according to a report with ICS-CERT.

Maxim Rupp, the independent researcher that discovered the vulnerabilities, tested the new firmware to validate that it resolves the vulnerabilities.

RELATED STORIES
Trihedral Fixes VTScada Vulnerabilities
GE Fixes Credential Vulnerability
Moxa Issue on Discontinued Product
ABB Fixes PCM600 Vulnerabilities

These vulnerabilities are remotely exploitable.

BAC-5051E routers, firmware versions prior to E0.2.0.2 suffer from the issues.

An unauthorized user can exploit these vulnerabilities to read the configuration of the target device.

KMC Controls is based in New Paris, IN. The affected products, BAC-5051E routers, see use mainly in building automation systems. BAC-5051E routers see action in commercial facilities. KMC Controls estimates that these products are used in the Americas, the Middle East, and Southeast Asia.

An unauthorized user can use a CSRF attack to read configuration data from a file.

CVE-2016-4494 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 5.3.

In addition, a missing authorization check allows an unauthorized user to read configuration data from a file.

CVE-2016-4495 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 5.3.

No known public exploits specifically target these vulnerabilities. However, an attacker with a low skill would be able to exploit these vulnerabilities.

KMC Controls released firmware Version E0.2.0.2 for the BAC-5051E router to add additional security for web-based access to the router’s configuration pages. KMC Controls recommends all BAC-5051E routers should upgrade to this version. Users can obtain the latest version of the firmware in the KMC Controls partner portal, which requires a login.

The BAC-5051E router is not intended to be a public facing Internet device. For best security, install the router behind a firewall inside a site’s intranet network. KMC Controls has also sent a copy of its technical bulletin to users. A copy of this bulletin can be found on KMC Controls’ web site in the service bulletin section.