ID

VAR-201511-0046


CVE

CVE-2015-6476


TITLE

plural Advantech EKI Vulnerability to gain access rights in device firmware

Trust: 0.8

sources: JVNDB: JVNDB-2015-005812

DESCRIPTION

Advantech EKI-122x-BE devices with firmware before 1.65, EKI-132x devices with firmware before 1.98, and EKI-136x devices with firmware before 1.27 have hardcoded SSH keys, which makes it easier for remote attackers to obtain access via an SSH session. Supplementary information : CWE Vulnerability type by CWE-798: Use of Hard-coded Credentials ( Using hard-coded credentials ) Has been identified. http://cwe.mitre.org/data/definitions/798.htmlBy a third party SSH Access may be gained through a session. Advantech EKI-122x-BE, EKI-132x and EKI-136x are all serial device networking servers of Advantech, Inc., which provide various redundant configurations and multiple channels for remote monitoring of serial devices via Ethernet communication protocol. Access configuration. Security vulnerabilities exist in several Advantech products. Multiple Advantech EKI products are prone to a security-bypass vulnerability

Trust: 2.7

sources: NVD: CVE-2015-6476 // JVNDB: JVNDB-2015-005812 // CNVD: CNVD-2015-07475 // BID: 77498 // IVD: 7c6174c4-2351-11e6-abef-000c29c66e3d // VULHUB: VHN-84437

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

category:['ICS']sub_category: -

Trust: 0.2

sources: IVD: 7c6174c4-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-07475

AFFECTED PRODUCTS

vendor:advantechmodel:eki-1321 seriesscope:lteversion:1.96

Trust: 1.0

vendor:advantechmodel:eki-122x seriesscope:lteversion:1.49

Trust: 1.0

vendor:advantechmodel:eki-1361 seriesscope:lteversion:1.17

Trust: 1.0

vendor:advantechmodel:eki-1322 seriesscope:lteversion:1.96

Trust: 1.0

vendor:advantechmodel:eki-1362 seriesscope:lteversion:1.17

Trust: 1.0

vendor:advantechmodel:eki-1221scope: - version: -

Trust: 0.8

vendor:advantechmodel:eki-1221dscope: - version: -

Trust: 0.8

vendor:advantechmodel:eki-1222scope: - version: -

Trust: 0.8

vendor:advantechmodel:eki-1222dscope: - version: -

Trust: 0.8

vendor:advantechmodel:eki-1224scope: - version: -

Trust: 0.8

vendor:advantechmodel:eki-122x seriesscope:ltversion:1.65

Trust: 0.8

vendor:advantechmodel:eki-1321scope: - version: -

Trust: 0.8

vendor:advantechmodel:eki-1321 seriesscope:ltversion:1.98

Trust: 0.8

vendor:advantechmodel:eki-1322scope: - version: -

Trust: 0.8

vendor:advantechmodel:eki-1322 seriesscope:ltversion:1.98

Trust: 0.8

vendor:advantechmodel:eki-1361scope: - version: -

Trust: 0.8

vendor:advantechmodel:eki-1361 seriesscope:ltversion:1.27

Trust: 0.8

vendor:advantechmodel:eki-1362scope: - version: -

Trust: 0.8

vendor:advantechmodel:eki-1362 seriesscope:ltversion:1.27

Trust: 0.8

vendor:advantechmodel:eki-122x-bescope:ltversion:1.65

Trust: 0.6

vendor:advantechmodel:eki-132xscope:ltversion:1.98

Trust: 0.6

vendor:advantechmodel:eki-136xscope:ltversion:1.27

Trust: 0.6

vendor:advantechmodel:eki-1361 seriesscope:eqversion:1.17

Trust: 0.6

vendor:advantechmodel:eki-122x seriesscope:eqversion:1.49

Trust: 0.6

vendor:advantechmodel:eki-1321 seriesscope:eqversion:1.96

Trust: 0.6

vendor:advantechmodel:eki-1362 seriesscope:eqversion:1.17

Trust: 0.6

vendor:advantechmodel:eki-1322 seriesscope:eqversion:1.96

Trust: 0.6

vendor:advantechmodel:eki-1360scope:eqversion:0

Trust: 0.3

vendor:advantechmodel:eki-1320scope:eqversion:0

Trust: 0.3

vendor:advantechmodel:eki-1220-bescope:eqversion:0

Trust: 0.3

vendor:advantechmodel:eki-1360scope:neversion:1.27

Trust: 0.3

vendor:advantechmodel:eki-1320scope:neversion:1.98

Trust: 0.3

vendor:advantechmodel:eki-1220-bescope:neversion:1.65

Trust: 0.3

vendor:eki 1321 seriesmodel: - scope:eqversion:*

Trust: 0.2

vendor:eki 1322 seriesmodel: - scope:eqversion:*

Trust: 0.2

vendor:eki 1361 seriesmodel: - scope:eqversion:*

Trust: 0.2

vendor:eki 1362 seriesmodel: - scope:eqversion:*

Trust: 0.2

vendor:eki 122x seriesmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 7c6174c4-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-07475 // BID: 77498 // JVNDB: JVNDB-2015-005812 // CNNVD: CNNVD-201511-113 // NVD: CVE-2015-6476

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-6476
value: HIGH

Trust: 1.0

NVD: CVE-2015-6476
value: HIGH

Trust: 0.8

CNVD: CNVD-2015-07475
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201511-113
value: CRITICAL

Trust: 0.6

IVD: 7c6174c4-2351-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

VULHUB: VHN-84437
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-6476
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-07475
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 7c6174c4-2351-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-84437
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: 7c6174c4-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-07475 // VULHUB: VHN-84437 // JVNDB: JVNDB-2015-005812 // CNNVD: CNNVD-201511-113 // NVD: CVE-2015-6476

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2015-005812 // NVD: CVE-2015-6476

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201511-113

TYPE

Design Error

Trust: 0.3

sources: BID: 77498

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-005812

PATCH

title:EKI-136*url:http://support.advantech.com.tw/Support/SearchResult.aspx?keyword=EKI-136*&searchtabs=Firmware

Trust: 0.8

title:EKI-132*url:http://support.advantech.com.tw/Support/SearchResult.aspx?keyword=EKI-132*&searchtabs=Firmware

Trust: 0.8

title:EKI-122*url:http://support.advantech.com.tw/Support/SearchResult.aspx?keyword=EKI-122*&searchtabs=Firmware

Trust: 0.8

title:Patches for several Advantech product SSH key vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/66571

Trust: 0.6

title:Multiple Advantech Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58608

Trust: 0.6

sources: CNVD: CNVD-2015-07475 // JVNDB: JVNDB-2015-005812 // CNNVD: CNNVD-201511-113

EXTERNAL IDS

db:NVDid:CVE-2015-6476

Trust: 3.6

db:ICS CERTid:ICSA-15-309-01

Trust: 3.4

db:CNNVDid:CNNVD-201511-113

Trust: 0.9

db:CNVDid:CNVD-2015-07475

Trust: 0.8

db:JVNDBid:JVNDB-2015-005812

Trust: 0.8

db:BIDid:77498

Trust: 0.4

db:IVDid:7C6174C4-2351-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:SEEBUGid:SSVID-89764

Trust: 0.1

db:VULHUBid:VHN-84437

Trust: 0.1

sources: IVD: 7c6174c4-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-07475 // VULHUB: VHN-84437 // BID: 77498 // JVNDB: JVNDB-2015-005812 // CNNVD: CNNVD-201511-113 // NVD: CVE-2015-6476

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-15-309-01

Trust: 3.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6476

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6476

Trust: 0.8

url:http://www.advantech.com

Trust: 0.3

sources: CNVD: CNVD-2015-07475 // VULHUB: VHN-84437 // BID: 77498 // JVNDB: JVNDB-2015-005812 // CNNVD: CNNVD-201511-113 // NVD: CVE-2015-6476

CREDITS

Neil Smith

Trust: 0.3

sources: BID: 77498

SOURCES

db:IVDid:7c6174c4-2351-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2015-07475
db:VULHUBid:VHN-84437
db:BIDid:77498
db:JVNDBid:JVNDB-2015-005812
db:CNNVDid:CNNVD-201511-113
db:NVDid:CVE-2015-6476

LAST UPDATE DATE

2025-04-13T23:09:44.756000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-07475date:2015-11-12T00:00:00
db:VULHUBid:VHN-84437date:2015-11-09T00:00:00
db:BIDid:77498date:2015-11-05T00:00:00
db:JVNDBid:JVNDB-2015-005812date:2015-11-10T00:00:00
db:CNNVDid:CNNVD-201511-113date:2015-11-09T00:00:00
db:NVDid:CVE-2015-6476date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:IVDid:7c6174c4-2351-11e6-abef-000c29c66e3ddate:2015-11-12T00:00:00
db:CNVDid:CNVD-2015-07475date:2015-11-12T00:00:00
db:VULHUBid:VHN-84437date:2015-11-07T00:00:00
db:BIDid:77498date:2015-11-05T00:00:00
db:JVNDBid:JVNDB-2015-005812date:2015-11-10T00:00:00
db:CNNVDid:CNNVD-201511-113date:2015-11-09T00:00:00
db:NVDid:CVE-2015-6476date:2015-11-07T03:59:00.127