Executive Summary

Summary
Title SHDesigns Resident Download Manager does not authenticate firmware downloads
Informations
Name VU#167623 First vendor Publication 2017-01-31
Vendor VU-CERT Last vendor Modification 2017-02-01
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#167623

SHDesigns Resident Download Manager does not authenticate firmware downloads

Original Release date: 31 Jan 2017 | Last revised: 01 Feb 2017

Overview

SHDesigns' Resident Download Manager (as well as the Ethernet Download Manager) does not authenticate firmware downloads before executing code and deploying them to devices.

Description

CWE-494: Download of Code Without Integrity Check - CVE-2016-6567

SHDesigns' Resident Download Manager provides firmware update capabilities for Rabbit 2000/3000 CPU boards, which according to the reporter may be used in some industrial control and embedded applications.

The Resident Download Manager does not verify that the firmware is authentic before executing code and deploying the firmware to devices. A remote attacker with the ability to send UDP traffic to the device may be able to execute arbitrary code on the device.

According to SHDesigns' website, the Resident Download Manager and other Rabbit Tools have been discontinued since June 2011.

Impact

A remote attacker with the ability to send UDP traffic to the device may be able to execute arbitrary code on the device.

Solution

The CERT/CC is currently unaware of a practical solution to this problem.

According to the reporter, affected users may disable the network update feature. It is also possible that developers of products using the Resident Download Manager may be able to write a download verification wrapper around the Resident Download Manager library, but may not be practical in all scenarios.

Affected users may also consider the following workaround:

Restrict network access

Restrict network access to the device containing the Rabbit CPU and Resident Download Manager to a secured LAN segment.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
AddOn TechnologiesAffected20 Jan 201701 Feb 2017
SHDesignsAffected13 Jan 201726 Jan 2017
Cobham plcUnknown05 Dec 201605 Dec 2016
Grass ValleyUnknown20 Jan 201720 Jan 2017
IDC CorporationUnknown20 Jan 201720 Jan 2017
MaguireUnknown20 Jan 201720 Jan 2017
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base9.3AV:N/AC:M/Au:N/C:C/I:C/A:C
Temporal8.0E:POC/RL:U/RC:UR
Environmental6.0CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

  • http://shdesigns.org/rabbit/
  • https://www.digi.com/products/rabbitprocessor
  • https://www.digi.com/lp/rabbit
  • https://cwe.mitre.org/data/definitions/494.html

Credit

Thanks to Nolan Ray of NCC Group for reporting this vulnerability.

This document was written by Garret Wassermann.

Other Information

  • CVE IDs:CVE-2016-6567
  • Date Public:31 Jan 2017
  • Date First Published:31 Jan 2017
  • Date Last Updated:01 Feb 2017
  • Document Revision:45

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/167623

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2018-09-10 21:24:27
  • Multiple Updates
2018-07-14 00:21:04
  • Multiple Updates
2017-02-01 21:23:35
  • Multiple Updates
2017-01-31 21:24:00
  • First insertion