ID

VAR-201512-0021


CVE

CVE-2015-7928


TITLE

eWON Vulnerability to gain access rights in device firmware

Trust: 0.8

sources: JVNDB: JVNDB-2015-006508

DESCRIPTION

eWON devices with firmware before 10.1s0 do not have an off autocomplete attribute for a password field, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation. eWON is an industrial router product of the Belgian eWON company. A security vulnerability exists in eWON using firmware prior to 10.1s0, which is caused by the program transmitting passwords in clear text. An attacker could exploit the vulnerability to obtain plain text passwords and unauthorized access rights. eWON are prone to the following security vulnerabilities: 1. Weak session management vulnerability 2. A cross-site request forgery vulnerability 3. HTML-injection vulnerability 5. A security weakness An attacker can exploit these issues to bypass the authentication mechanism and gain unauthorized access, execute attacker-supplied HTML or JavaScript code in the context of the affected site, steal cookie-based authentication credentials, obtain sensitive information, and perform certain unauthorized actions. This may aid in further attacks. The vulnerability stems from the fact that the program does not set the auto-complete property for the password field. *eWON sa Industrial router - Multiple Vulnerabilities* eWON connects the machine across the Internet Breaking the barrier between industrial applications and IT standards, the mission of eWON is to connect industrial machines securely to the Internet, enabling easy remote access and gathering all types of technical data originating from industrial machines. Typical applications within the scope of our mission include remote maintenance, predictive maintenance, remote services, asset management, remote metering, multi-site building management, M2M, and more. *AFFECTED PRODUCTS* The following eWON router firmware versions are affected: *All eWON firmware versions prior to 10.1s0* *Reference* https://ics-cert.us-cert.gov/advisories/ICSA-15-342-01 *Vulnerabilities* *WEAK SESSION MANAGEMENT - FIXED by eWON* CVE-2015-7924 Session remains active even after user performs log off. Session is destroyed only after browser is exited. *CROSS-SITE REQUEST FORGERY ATTACKS - NOT FIXED by eWON* CVE-2015-7925 There is no CSRF token set by the application in any of the forms / pages. Any & all functions can be executed silently without getting validated from authorized user, if / when this issue is exploited. …..…..…..…..…..…..…..…..…..…..…..…..…..…..…..…..…..….. *eWON says*Verified but won't fix. The current implementation is done by design (the user must be able to submit forms using GET only). As CSRF attack suggests, the user must be already logged on the eWON using its internet browser and the session must thus be valid on user's browser. However eWON IP must also be known by the attacker knowing that the VPN will set another IP each time the victim connects to eWON. The connection to an eWON device is only possible by a secured VPN, a point- to-point LAN or a secured LAN. On their website, eWON describes this issue as following: http://ewon.biz/support/news/support/ewon-security-enhancement-7529-01 Mitigating factors: Many requirements have to be met for a successful attack: The attacker needs a valid login to the eWON. The attacker needs HTTP access to the eWON (e.g. eWON web server exposed to the public Internet). Also connections to eWON devices should in standard use cases only occur through: - a point-to-point LAN, a secured LAN (sniffing the victim IP is not really achievable in these two cases) - or a secured VPN (VPN allocated IP address is then defined by the VPN server). —> eWON team just doesn't understand how CSRF works. And continue to assume the device mgmt portal is accessible ONLY over the VPN, P2P LAN or secured LAN. They clearly have not looked at Shodan and / or publicly accessible portals. …..…..…..…..…..…..…..…..…..…..…..…..…..…..…..…..…..….. *WEAK RBAC CONTROLS - FIXED by eWON* CVE-2015-7926 The software allows an unauthenticated user to gather information and status of I/O servers through the use of a forged URL. *NOTE*: It should be - *An unauthorized / low-privileged user can perform several unauthorized actions such as reading, updating, & deleting I/O servers, configurations, enabling/disabling I/O servers, & accessing, deleting valid users.* *Scenario* Two users 1. adm - Default privileged user - can perform all administrative functions - full rights - [ v o a c f e h j ] 2. test - newly created user - no rights - no [ v o a c f e h j ] *Issue 1* *It is possible to enumerate valid I/O servers* I/O Server list is a set defined list: MEM cbIOSrvList=0 EWON cbIOSrvList=1 MODBUS cbIOSrvList=2 NETMPI ... SNMP cbIOSrvList=4 DF1 ... FINS ... so on ... & others An unauthorized / unprivileged user can gather information and status of these IO servers in the following manner: *Logged in as ‘test'* Access - http://<IP>/rcgi.bin/Edit1IOSrvForm?cbIOSrvList=0&Ac2on=edit If Response says -> Not Configurable. -> Implies Not a valid I/O If Response says -> Access Denied -> Implies a valid I/O -> Window Title reveals the I/O server type - example, Modbus IO Server Config, DF1 1O Server Config, n so on *Issue 2* *It is possible to modify parameter values of I/O servers directly*Updating the values when logged in as 'test' Change POST request to GET Modify param values http://<IP>/rcgi.bin/EditUsrIOSrvForm?edCfgData=MinInterval%3A10%0D %0AMaxInterval%3A268435459%0D%0AReverseCount %3A0&B1=Update&AST_IOSrvNdx=1 Response -> IO Server config updated. Similarly, other I/O server configuration can be updated. In case an I/O server is not Enabled, it can be enabled and configured with custom values. *Following poc for SNMP I/O Server settings (This IO server communicates with any SNMP device)* Enabling and configuring SNMP I/O server (logged in as test) http://<IP>/rcgi.bin/EditAdvUsrIOSrvForm? edEnabledA=1&edGlobAddrA=&edPeriodA=&edGlobAddrB=&edPeriodB=&edGlo bAddrC=&edPeriodC=&B1=Update+Config&IOServer=SNMP -> IO Server config updated. *Issue 3* *Deleting All Users* It is possible for a user with no rights to: 1. Enumerate configured users 2. Delete any & all users. HTTP GET request to delete a user (when logged in as 'test') (unauthorized request) http://<IP>/rcgi.bin/EditForm?CB2=3&NbCB=4&Opera2onType=DeleteUser This brings up a confirmation prompt validating if we really want to delete the user. It presents the username and offers two options - Option 1 - Cancel and Confirm/Delete Option 2 - Select Confirm/Delete ..... Users List test Please confirm you want to delete these items Select Confirm/Delete ..... Next, the url redirects to DeleteForm which then shows Access denied twice ..... -> But the user gets deleted anyway. :) Verify by Refreshing User List *Enumerating Users* In order to enumerate valid users, we only need to submit the first DeleteUser request http://<IP>/rcgi.bin/EditForm?CB2=4&NbCB=3&Opera2onType=DeleteUser It will show the username. This process can of course be automated to view all valid application usernames. …..…..…..…..…..…..…..…..…..…..…..…..…..…..…..…..…..….. *eWON considered WEAK RBAC issue a minor one. Apparently, they didn’t understood the impact at all.* eWON said: It's a minor issue as these informations are already available through eWON User Manual. We will however completely block the page in a future eWON firmware release when user credentials don't meet the requirements to avoid any ambiguity regarding eWON security. —> Regardless, the new firmware says this issue has been fixed.. …..…..…..…..…..…..…..…..…..…..…..…..…..…..…..…..…..….. *STORED CROSS-SITE SCRIPTING - NOT FIXED by eWON* CVE-2015-7927 *Vulnerable functions / parameters* Create / Edit User User First Name User Last Name User information Create / Edit Tag Tag Description …..…..…..…..…..…..…..…..…..…..…..…..…..…..…..…..…..….. eWON says Verified. Won't fix: We left the possibility to include HTML tags or javascript in form fields and form url parameters to meet some specific final user needs. Note that this kind of injection is achievable through FTP upload as everything is saved in the eWON config files. Furthermore all theses XSS exploit also require valid user authentication and rights. —> Yeah, it’s a feature and input validation is a useless practice anyway.. …..…..…..…..…..…..…..…..…..…..…..…..…..…..…..…..…..….. *Reflected XSS - NOT FIXED by eWON* Vulnerable parameter - AST_ErrorMsg http://<IP>/rcgi.bin/wsdForm?sys_Csave=1&AST_ErrorMsg=Success<script>alert("xss-AST_ErrorMsg")</ script>&sys_IpMbsSrvPort=502&sys_IpEipSrvPort=44818&sys_IpIsoSrvPort=102& sys_IpFinsSrvPort=9600&sys_TagPollMode=0&sys_IOTcpDefTO=1000&btUpdate= Update *PASSWORDS NOT SECURED - PARTIAL FIX by eWON* CVE-2015-7928 Passwords are passed in plain text allowing a malicious party to retrieve them from network traffic. The autocomplete setting of some eWON forms also allows these passwords to be retrieved from the browser. Compromise of the credentials would allow unauthenticated access. …..…..…..…..…..…..…..…..…..…..…..…..…..…..…..…..…..….. eWON says 2. Won't fix as the final user is supposed to configure eWON through VPN. —> Yeah, *supposed to*.. …..…..…..…..…..…..…..…..…..…..…..…..…..…..…..…..…..….. *POST/GET ISSUES - NOT FIXED by eWON* CVE-2015-7929 eWON firmware web server allows the use of the HTML command GET in place of POST. GET is less secure because data that are sent are part of the URL. …..…..…..…..…..…..…..…..…..…..…..…..…..…..…..…..…..….. eWON says Won't fix. This could be a problem regarding CRSF (issue B) but the final user is supposed to configure eWON through VPN (and thus https). Mitigating factors: This could be an issue regarding the CSRF attacks described above. However as already mentioned the eWON firmware exposure to CSRF attacks is really limited. Thus having equivalent POST and GET parameters handling for each request sent to the eWON webserver is by extension not problematic. —> Yeah, *supposed to*.. Not problematic... …..…..…..…..…..…..…..…..…..…..…..…..…..…..…..…..…..….. -- Best Regards, Karn Ganeshen

Trust: 2.7

sources: NVD: CVE-2015-7928 // JVNDB: JVNDB-2015-006508 // CNVD: CNVD-2015-08454 // BID: 79625 // VULHUB: VHN-85889 // VULMON: CVE-2015-7928 // PACKETSTORM: 135069

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-08454

AFFECTED PRODUCTS

vendor:ewonmodel:ewonscope:lteversion:10.0s0

Trust: 1.0

vendor:ewonmodel:ewonscope:ltversion:10.1s0

Trust: 0.8

vendor:ewonmodel:<10.1s0scope: - version: -

Trust: 0.6

vendor:ewonmodel:ewonscope:eqversion:10.0s0

Trust: 0.6

vendor:ewonmodel:ewonscope:eqversion:0

Trust: 0.3

vendor:ewonmodel:10.1s0scope:neversion: -

Trust: 0.3

sources: CNVD: CNVD-2015-08454 // BID: 79625 // JVNDB: JVNDB-2015-006508 // CNNVD: CNNVD-201512-550 // NVD: CVE-2015-7928

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-7928
value: HIGH

Trust: 1.0

NVD: CVE-2015-7928
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2015-08454
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201512-550
value: MEDIUM

Trust: 0.6

VULHUB: VHN-85889
value: MEDIUM

Trust: 0.1

VULMON: CVE-2015-7928
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-7928
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2015-08454
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-85889
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2015-7928
baseSeverity: HIGH
baseScore: 8.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 3.1
impactScore: 4.7
version: 3.0

Trust: 1.0

sources: CNVD: CNVD-2015-08454 // VULHUB: VHN-85889 // VULMON: CVE-2015-7928 // JVNDB: JVNDB-2015-006508 // CNNVD: CNNVD-201512-550 // NVD: CVE-2015-7928

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-85889 // JVNDB: JVNDB-2015-006508 // NVD: CVE-2015-7928

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201512-550

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201512-550

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-006508

PATCH

title:eWON Security Enhancement (FW 10.1s0)url:http://ewon.biz/support/news/support/ewon-security-enhancement-7529-01

Trust: 0.8

title:eWON plaintext password information disclosure vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/68899

Trust: 0.6

title:eWON Repair measures for information disclosure vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=59317

Trust: 0.6

sources: CNVD: CNVD-2015-08454 // JVNDB: JVNDB-2015-006508 // CNNVD: CNNVD-201512-550

EXTERNAL IDS

db:NVDid:CVE-2015-7928

Trust: 3.6

db:ICS CERTid:ICSA-15-351-03

Trust: 2.9

db:BIDid:79625

Trust: 2.7

db:PACKETSTORMid:135069

Trust: 1.3

db:JVNDBid:JVNDB-2015-006508

Trust: 0.8

db:CNNVDid:CNNVD-201512-550

Trust: 0.7

db:CNVDid:CNVD-2015-08454

Trust: 0.6

db:VULHUBid:VHN-85889

Trust: 0.1

db:VULMONid:CVE-2015-7928

Trust: 0.1

db:ICS CERTid:ICSA-15-342-01

Trust: 0.1

sources: CNVD: CNVD-2015-08454 // VULHUB: VHN-85889 // VULMON: CVE-2015-7928 // BID: 79625 // JVNDB: JVNDB-2015-006508 // PACKETSTORM: 135069 // CNNVD: CNNVD-201512-550 // NVD: CVE-2015-7928

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-15-351-03

Trust: 3.0

url:http://www.securityfocus.com/bid/79625

Trust: 2.4

url:http://ewon.biz/support/news/support/ewon-security-enhancement-7529-01

Trust: 1.9

url:http://seclists.org/fulldisclosure/2015/dec/118

Trust: 1.2

url:http://packetstormsecurity.com/files/135069/ewon-xss-csrf-session-management-rbac-issues.html

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7928

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-7928

Trust: 0.8

url:http://ewon.biz

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/200.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://<ip>/rcgi.bin/deleteform

Trust: 0.1

url:http://<ip>/rcgi.bin/edit1iosrvform?cbiosrvlist=0&ac2on=edit

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7927

Trust: 0.1

url:http://<ip>/rcgi.bin/editform?cb2=4&nbcb=3&opera2ontype=deleteuser

Trust: 0.1

url:http://<ip>/rcgi.bin/wsdform?sys_csave=1&ast_errormsg=success<script>alert("xss-ast_errormsg")</

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7925

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7926

Trust: 0.1

url:http://<ip>/rcgi.bin/editusriosrvform?edcfgdata=mininterval%3a10%0d

Trust: 0.1

url:https://ics-cert.us-cert.gov/advisories/icsa-15-342-01

Trust: 0.1

url:http://<ip>/rcgi.bin/editform?cb2=3&nbcb=4&opera2ontype=deleteuser

Trust: 0.1

url:http://<ip>/rcgi.bin/editadvusriosrvform?

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7929

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7928

Trust: 0.1

sources: CNVD: CNVD-2015-08454 // VULHUB: VHN-85889 // VULMON: CVE-2015-7928 // BID: 79625 // JVNDB: JVNDB-2015-006508 // PACKETSTORM: 135069 // CNNVD: CNNVD-201512-550 // NVD: CVE-2015-7928

CREDITS

Karn Ganeshen

Trust: 1.0

sources: BID: 79625 // PACKETSTORM: 135069 // CNNVD: CNNVD-201512-550

SOURCES

db:CNVDid:CNVD-2015-08454
db:VULHUBid:VHN-85889
db:VULMONid:CVE-2015-7928
db:BIDid:79625
db:JVNDBid:JVNDB-2015-006508
db:PACKETSTORMid:135069
db:CNNVDid:CNNVD-201512-550
db:NVDid:CVE-2015-7928

LAST UPDATE DATE

2025-04-13T23:14:24.237000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-08454date:2015-12-24T00:00:00
db:VULHUBid:VHN-85889date:2016-12-07T00:00:00
db:VULMONid:CVE-2015-7928date:2016-12-07T00:00:00
db:BIDid:79625date:2015-12-17T00:00:00
db:JVNDBid:JVNDB-2015-006508date:2015-12-24T00:00:00
db:CNNVDid:CNNVD-201512-550date:2015-12-24T00:00:00
db:NVDid:CVE-2015-7928date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-08454date:2015-12-24T00:00:00
db:VULHUBid:VHN-85889date:2015-12-23T00:00:00
db:VULMONid:CVE-2015-7928date:2015-12-23T00:00:00
db:BIDid:79625date:2015-12-17T00:00:00
db:JVNDBid:JVNDB-2015-006508date:2015-12-24T00:00:00
db:PACKETSTORMid:135069date:2015-12-24T20:35:19
db:CNNVDid:CNNVD-201512-550date:2015-12-21T00:00:00
db:NVDid:CVE-2015-7928date:2015-12-23T11:59:04.157