New JetNet Firmware Patches Holes

Friday, October 27, 2017 @ 02:10 PM gHale

Korenix created new firmware to mitigate a use of hard-coded cryptographic key and use of hard-coded credentials vulnerabilities in its JetNet product, according to a report with ICS-CERT.

Successful exploitation of these remotely exploitable vulnerabilities, discovered by Mandar Jadhav of the Qualys Vulnerability Signature/Research Team, could allow a remote attacker to gain remote access to the device to run arbitrary code and perform man-in-the-middle attacks.

Rockwell KRACK Advisory for Stratix 5100
SpiderControl Mitigates MicroBrowser Hole
Boston Scientific Mitigates Vulnerabilities
Holes in Progea Movicon SCADA/HMI

The following versions of JetNet, an Ethernet switch, suffer from the issues:
• JetNet5018G version 1.4
• JetNet5310G version 1.4a
• JetNet5428G-2G-2FX version 1.4
• JetNet5628G-R version 1.4
• JetNet5628G version 1.4
• JetNet5728G-24P version 1.4
• JetNet5828G version 1.1d
• JetNet6710G-HVDC version 1.1e
• JetNet6710G version 1.1

No known public exploits specifically target these vulnerabilities. However, an attacker with low skill level could leverage the vulnerabilities.

An attacker may gain access to hard-coded certificates and private keys allowing the attacker to perform man-in-the-middle attacks.

CVE-2017-14021 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 9.8.

In addition, the software uses undocumented hard-coded credentials that may allow an attacker to gain remote access.

CVE-2017-14027 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 9.8.

The product sees use mainly in the commercial facilities, critical manufacturing, and transportation systems sectors. It also sees action on a global basis.

Walnut, CA-based Korenix produced new firmware that removes the undocumented hard-coded credentials from supported systems. The new firmware is available for download.

Korenix recommends affected users use the software support certificate replacement feature to change certificates on affected devices.

Click here for customer support links for Korenix.

Leave a Reply

You must be logged in to post a comment.