ID

VAR-201809-0242


CVE

CVE-2018-15483


TITLE

KONE Group Controller Vulnerability related to input validation on devices

Trust: 0.8

sources: JVNDB: JVNDB-2018-010342

DESCRIPTION

An issue was discovered on KONE Group Controller (KGC) devices before 4.6.5. Denial of Service can occur through the open HTTP interface, aka KONE-04. KONE Group Controller (KGC) Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. These were discovered during a black box assessment and therefore the vulnerability list should not be considered exhaustive. Its purpose is to optimize the operation of a group of elevators, and it allows features such as destination calls and locking and unlocking floors. Group controller is not an essential component of an elevator control system and vulnerabilities in KGC do not affect the safety of the elevators connected to the group. More information at https://www.kone.com/en/vulnerability.aspx Affected Software And Versions ============================== - KONE KGC version 4.6.4 and below CVE === The following CVEs were assigned to the issues described in this report: CVE-2018-15483 CVE-2018-15484 CVE-2018-15485 CVE-2018-15486 Vulnerability Overview ====================== 01. CVE-2018-15484: Unauthenticated Remote Code Execution 02. CVE-2018-15486: Unauthenticated Local File Inclusion / Unauthenticated Local File modification 03. CVE-2018-15485: FTP without authentication and authorization 04. CVE-2018-15483: Denial of Service Vulnerability Details ===================== --------------------------------------------- CVE-2018-15484: Unauthenticated Remote Code Execution --------------------------------------------- By modifying the file autoexec.bat via the web interface using an unauthenticated local file modification method (see CVE-2018-15486), an attacker can inject arbitrary operating systems commands, which get executed at boot time. To trigger a reboot, an HTTP GET request to /reboot has to be made. This enables an attacker to compromise the integrity of all software running on the device. This includes specific autoexec commands but also the full range of command.com (operating system) commands regarding to FreeDOS. Injecting an interactive command, such as the help command, effectively prevents the KGC from booting up again and therefore causes a Denial of Service Attack (CVE-2018-15483). -------------------------------------------------- CVE-2018-15486: Unauthenticated Local File Inclusion / Unauthenticated Local File modification -------------------------------------------------- By modifying the name parameter of the file endpoint, any file the webserver has access to can be viewed. GET /file?name=secret.txt HTTP/1.1 Host: <redacted> However, more importantly, by modifying the name parameter of the editfile endpoint, any file can be modified: GET /editfile?name=secret.txt HTTP/1.1 Host: <redacted> After calling the endpoint above, the file to edit is presented in a textbox for modification. This way, attackers can choose from a wide range of attack scenarios, e.g., persisting backdoors in files such as KERNEL.SYS, enable access to floors, they wouldn't have access to in normal cases (KGC config files) or carry out DNS redirection- and Man-in-the-Middle attacks. The latter could be achieved by modifying the DNS parameter or the default gateway, respectively: [ETHERNET] card=7 : DHCP on or off [0-1] : Attacker would switch to 0 dhcp=0 : Static IP address [IP] : Set a static IP ip=<static IP> : Subnet mask [IP] mask=<appropriate mask> : Default gateway [IP] : Change gateway default_gateway=<attacker controlled gateway> : DNS [IP] dns=<attacker controlled dns server> : Host name [string] host_name=KGC_1 This way, an attacker could read and modify all the data transmitted over the wires. ----------------------------------------------- CVE-2018-15485: FTP without authentication and authorization ----------------------------------------------- FTP on the KGC is enabled on port 21 and is not secured by authentication or authorization mechanisms. A user that connects to that port is logged in as SuperUser, with needing a username or password (also blank usernames and passwords are accepted). $ ftp -p <redacted-IP> Connected to <redacted-IP>. 220 KGC FTP Server ready Name (<redacted-IP>:username): <blank> 331 User name okay, need password. Password: <blank> 230 SuperUser logged in, proceed. Remote system type is WIN32. This way all available data can be downloaded and new data can be uploaded to the KGC. --------------------------------------------- CVE-2018-15483: Denial of Service --------------------------------------------- There are several possible ways to cause a denial of service on the KGC. One of them is the possibility to reboot the system via the web interface. An attacker could reboot the system every time it boots back up to interrupt the service and cause a denial of service attack: GET /reboot HTTP/1.1 Host: <redacted> Author ====== The vulnerabilities were discovered by Sebastian Neuner (@sebastian9er) from the Google Security Team. Timeline ======== 2018/05/10 - Security report sent to KONE security. 2018/05/11 - KONE acknowledges the report and starts working on the issues. 2018/05/25 - KONE requested grace period due to internal patch cycle. 2018/05/25 - Google granted grace period until patch available and being deployed. 2018/08/06 - Public disclosure on the bugtraq Mailing List

Trust: 1.89

sources: NVD: CVE-2018-15483 // JVNDB: JVNDB-2018-010342 // VULHUB: VHN-125747 // VULMON: CVE-2018-15483 // PACKETSTORM: 149252

AFFECTED PRODUCTS

vendor:konemodel:group controllerscope:ltversion:4.6.5

Trust: 1.8

vendor:konemodel:group controllerscope:eqversion: -

Trust: 0.6

sources: JVNDB: JVNDB-2018-010342 // CNNVD: CNNVD-201809-352 // NVD: CVE-2018-15483

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-15483
value: HIGH

Trust: 1.0

NVD: CVE-2018-15483
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201809-352
value: HIGH

Trust: 0.6

VULHUB: VHN-125747
value: HIGH

Trust: 0.1

VULMON: CVE-2018-15483
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-15483
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-125747
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-15483
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-125747 // VULMON: CVE-2018-15483 // JVNDB: JVNDB-2018-010342 // CNNVD: CNNVD-201809-352 // NVD: CVE-2018-15483

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-125747 // JVNDB: JVNDB-2018-010342 // NVD: CVE-2018-15483

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201809-352

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201809-352

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-010342

PATCH

title:Vulnerabilities in KONE Group Controller (KGC)url:https://www.kone.com/en/vulnerability.aspx

Trust: 0.8

title:KONE Group Controller Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=84666

Trust: 0.6

sources: JVNDB: JVNDB-2018-010342 // CNNVD: CNNVD-201809-352

EXTERNAL IDS

db:NVDid:CVE-2018-15483

Trust: 2.7

db:PACKETSTORMid:149252

Trust: 1.9

db:JVNDBid:JVNDB-2018-010342

Trust: 0.8

db:CNNVDid:CNNVD-201809-352

Trust: 0.7

db:VULHUBid:VHN-125747

Trust: 0.1

db:VULMONid:CVE-2018-15483

Trust: 0.1

sources: VULHUB: VHN-125747 // VULMON: CVE-2018-15483 // JVNDB: JVNDB-2018-010342 // PACKETSTORM: 149252 // CNNVD: CNNVD-201809-352 // NVD: CVE-2018-15483

REFERENCES

url:https://www.kone.com/en/vulnerability.aspx

Trust: 1.9

url:http://packetstormsecurity.com/files/149252/kone-kgc-4.6.4-dos-code-execution-lfi-bypass.html

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-15483

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-15483

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://seclists.org/fulldisclosure/2018/sep/8

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-15486

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-15484

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-15485

Trust: 0.1

sources: VULHUB: VHN-125747 // VULMON: CVE-2018-15483 // JVNDB: JVNDB-2018-010342 // PACKETSTORM: 149252 // CNNVD: CNNVD-201809-352 // NVD: CVE-2018-15483

CREDITS

Sebastian Neuner

Trust: 0.1

sources: PACKETSTORM: 149252

SOURCES

db:VULHUBid:VHN-125747
db:VULMONid:CVE-2018-15483
db:JVNDBid:JVNDB-2018-010342
db:PACKETSTORMid:149252
db:CNNVDid:CNNVD-201809-352
db:NVDid:CVE-2018-15483

LAST UPDATE DATE

2024-11-23T21:52:50.492000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-125747date:2018-11-14T00:00:00
db:VULMONid:CVE-2018-15483date:2018-11-14T00:00:00
db:JVNDBid:JVNDB-2018-010342date:2018-12-13T00:00:00
db:CNNVDid:CNNVD-201809-352date:2018-09-10T00:00:00
db:NVDid:CVE-2018-15483date:2024-11-21T03:50:54.707

SOURCES RELEASE DATE

db:VULHUBid:VHN-125747date:2018-09-07T00:00:00
db:VULMONid:CVE-2018-15483date:2018-09-07T00:00:00
db:JVNDBid:JVNDB-2018-010342date:2018-12-13T00:00:00
db:PACKETSTORMid:149252date:2018-09-06T14:15:46
db:CNNVDid:CNNVD-201809-352date:2018-09-10T00:00:00
db:NVDid:CVE-2018-15483date:2018-09-07T22:29:01.117