SCADA Vulnerabilities & Exposures (SVE)

CRITIFENCE® SCADA Vulnerabilities and Exposures Database (SVE)

[SVE-909386500] KMC Controls Conquest BACnet Router Vulnerabilities

Date Type Platform Author EDB-ID CVE-ID OSVDB-ID Download App SIS Signature
2016-06-07OTHERBAC-5051EMaxim RuppN/A2016-4494, 2016-4495N/AN/AN/A

Source

						
							
								
#
# KMC Controls Conquest BACnet Router Vulnerabilities
#


### OVERVIEW

This advisory was originally posted to the US-CERT secure Portal library on May 5, 2016, and is being released to the NCCIC/ICS-CERT web site.

Independent researcher Maxim Rupp has identified authentication and cross-site request forgery (CSRF) vulnerabilities in KMC Controls' Conquest BACnet routers through its web interface. KMC Controls has produced new firmware to mitigate these vulnerabilities. Maxim Rupp has tested the new firmware to validate that it resolves the vulnerabilities.

These vulnerabilities could be exploited remotely.




### AFFECTED PRODUCTS

KMC Controls reports that the vulnerabilities affect the following products:
BAC-5051E routers, firmware versions prior to E0.2.0.2






### IMPACT

An unauthorized user can exploit these vulnerabilities to read the configuration of the target device.

Impact to individual organizations depends on many factors that are unique to each organization. ICS-CERT recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation.






### BACKGROUND

KMC Controls is based in the United States.

The affected products, BAC-5051E routers, are used in building automation systems. According to KMC Controls, BAC-5051E routers are used in Commercial Facilities. KMC Controls estimates that these products are used in the Americas, the Middle East, and Southeast Asia.





### VULNERABILITY CHARACTERIZATION


# VULNERABILITY OVERVIEW

CROSS-SITE REQUEST FORGERY

An unauthorized user can use a CSRF attack to read configuration data from a file.
CVE-2016-4494 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).



MISSING AUTHENTICATION FOR CRITICAL FUNCTION

A missing authorization check allows an unauthorized user to read configuration data from a file.

CVE-2016-4495 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).



### VULNERABILITY DETAILS


# EXPLOITABILITY

These vulnerabilities could be exploited remotely.


# EXISTENCE OF EXPLOIT

No known public exploits specifically target these vulnerabilities.


# DIFFICULTY

An attacker with a low skill would be able to exploit these vulnerabilities.





### MITIGATION

KMC Controls has released firmware Version E0.2.0.2 for the BAC-5051E router to add additional security for web-based access to the router's configuration pages. KMC Controls recommends that all BAC-5051E routers be upgraded to this version. Users can obtain the latest version of the firmware in the KMC Controls partner portal (requires a login).

https://partners.kmccontrols.com/user/login


According to KMC Controls, the BAC-5051E router is not intended to be a public facing Internet device. For best security, install the router behind a firewall inside a site's intranet network. KMC Controls has also sent a copy of its technical bulletin to users. A copy of this bulletin can be found on KMC Controls' web site in the service bulletin section.