ID

VAR-201305-0008


CVE

CVE-2012-4697


TITLE

TURCK BL20/BL67 FTP Built-in account security bypass vulnerability

Trust: 0.8

sources: IVD: ef1f1088-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-05966

DESCRIPTION

TURCK BL20 Programmable Gateway and BL67 Programmable Gateway have hardcoded accounts, which allows remote attackers to obtain administrative access via an FTP session. The TURCK BL20/BL67 is an industrial control system device. The TURCK BL20/BL67 FTP service uses built-in authentication credentials that allow remote attackers to gain administrator access to the device via TCP port 21 and to operate communications between remote I/O, PLC or DCS systems. A remote attacker can exploit the vulnerability to gain access to administrator privileges. TURCK BL20 and BL67 are prone to a security-bypass vulnerability. http://drupal.org/node/207891. TURCK BL20/BL67 are two programmable gateway products of German Turck (TURCK) company. The product is widely used in agriculture, automobile industry and manufacturing in European and American countries. There is a security bypass vulnerability in all versions of TURCK BL20/BL67. The vulnerability stems from the existence of some default accounts in the device, which are hard-coded in the device

Trust: 2.7

sources: NVD: CVE-2012-4697 // JVNDB: JVNDB-2013-002816 // CNVD: CNVD-2013-05966 // BID: 59979 // IVD: ef1f1088-2352-11e6-abef-000c29c66e3d // VULHUB: VHN-57978

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

category:['ICS']sub_category: -

Trust: 0.2

sources: IVD: ef1f1088-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-05966

AFFECTED PRODUCTS

vendor:turckmodel:bl20 programmable gatewayscope:eqversion: -

Trust: 3.2

vendor:turckmodel:bl67 programmable gatewayscope:eqversion: -

Trust: 3.2

vendor:turckmodel:bl67 programmable gatewayscope: - version: -

Trust: 1.4

vendor:turckmodel:bl20 programmable gatewayscope: - version: -

Trust: 1.4

vendor:bl20 programmable gatewaymodel: - scope:eqversion: -

Trust: 0.4

vendor:bl67 programmable gatewaymodel: - scope:eqversion: -

Trust: 0.4

vendor:turckmodel:bl67 programmable gatewayscope:eqversion:0

Trust: 0.3

vendor:turckmodel:bl20 programmable gatewayscope:eqversion:0

Trust: 0.3

sources: IVD: ef1f1088-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-05966 // BID: 59979 // JVNDB: JVNDB-2013-002816 // CNNVD: CNNVD-201305-384 // NVD: CVE-2012-4697

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-4697
value: HIGH

Trust: 1.0

NVD: CVE-2012-4697
value: HIGH

Trust: 0.8

CNVD: CNVD-2013-05966
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201305-384
value: CRITICAL

Trust: 0.6

IVD: ef1f1088-2352-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

VULHUB: VHN-57978
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-4697
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2013-05966
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: ef1f1088-2352-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-57978
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: ef1f1088-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-05966 // VULHUB: VHN-57978 // JVNDB: JVNDB-2013-002816 // CNNVD: CNNVD-201305-384 // NVD: CVE-2012-4697

PROBLEMTYPE DATA

problemtype:CWE-255

Trust: 1.1

problemtype:CWE-264

Trust: 0.8

sources: VULHUB: VHN-57978 // JVNDB: JVNDB-2013-002816 // NVD: CVE-2012-4697

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201305-384

TYPE

Trust management

Trust: 0.8

sources: IVD: ef1f1088-2352-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201305-384

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-002816

PATCH

title:Top Pageurl:http://www.turck-usa.com/index.htm

Trust: 0.8

title:TURCK BL20/BL67 FTP built-in account security bypass vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/34242

Trust: 0.6

sources: CNVD: CNVD-2013-05966 // JVNDB: JVNDB-2013-002816

EXTERNAL IDS

db:NVDid:CVE-2012-4697

Trust: 3.6

db:ICS CERTid:ICSA-13-136-01

Trust: 3.4

db:BIDid:59979

Trust: 1.0

db:CNNVDid:CNNVD-201305-384

Trust: 0.9

db:CNVDid:CNVD-2013-05966

Trust: 0.8

db:JVNDBid:JVNDB-2013-002816

Trust: 0.8

db:SECUNIAid:53456

Trust: 0.6

db:IVDid:EF1F1088-2352-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULHUBid:VHN-57978

Trust: 0.1

sources: IVD: ef1f1088-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-05966 // VULHUB: VHN-57978 // BID: 59979 // JVNDB: JVNDB-2013-002816 // CNNVD: CNNVD-201305-384 // NVD: CVE-2012-4697

REFERENCES

url:http://ics-cert.us-cert.gov/advisories/icsa-13-136-01

Trust: 3.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4697

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4697

Trust: 0.8

url:http://secunia.com/advisories/53456

Trust: 0.6

url:http://www.turck-usa.com/index.htm

Trust: 0.3

sources: CNVD: CNVD-2013-05966 // VULHUB: VHN-57978 // BID: 59979 // JVNDB: JVNDB-2013-002816 // CNNVD: CNNVD-201305-384 // NVD: CVE-2012-4697

CREDITS

Rubén Santamarta of IOActive

Trust: 0.3

sources: BID: 59979

SOURCES

db:IVDid:ef1f1088-2352-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2013-05966
db:VULHUBid:VHN-57978
db:BIDid:59979
db:JVNDBid:JVNDB-2013-002816
db:CNNVDid:CNNVD-201305-384
db:NVDid:CVE-2012-4697

LAST UPDATE DATE

2025-04-11T23:12:01.107000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-05966date:2013-05-28T00:00:00
db:VULHUBid:VHN-57978date:2013-06-24T00:00:00
db:BIDid:59979date:2013-05-16T00:00:00
db:JVNDBid:JVNDB-2013-002816date:2013-05-27T00:00:00
db:CNNVDid:CNNVD-201305-384date:2013-06-08T00:00:00
db:NVDid:CVE-2012-4697date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:IVDid:ef1f1088-2352-11e6-abef-000c29c66e3ddate:2013-05-23T00:00:00
db:CNVDid:CNVD-2013-05966date:2013-05-23T00:00:00
db:VULHUBid:VHN-57978date:2013-05-23T00:00:00
db:BIDid:59979date:2013-05-16T00:00:00
db:JVNDBid:JVNDB-2013-002816date:2013-05-27T00:00:00
db:CNNVDid:CNNVD-201305-384date:2013-05-21T00:00:00
db:NVDid:CVE-2012-4697date:2013-05-23T17:55:02.870