Janitza Multiple UMG Devices Remote Debug Interface RCE

high Nessus Plugin ID 87891

Synopsis

The remote host has an exposed debug service that allows system functionality.

Description

The remote host has an unprotected debug interface. An unauthenticated, remote attacker can exploit this to execute system commands and JASIC code.

Solution

Upgrade to an experimental firmware version available from the vendor website. Alternatively, secure non-essential ports with a firewall per the vendor documentation.

See Also

http://www.nessus.org/u?3e5abea9

https://www.janitza.com/experimental-downloads.html

Plugin Details

Severity: High

ID: 87891

File Name: scada_janitza_debug_svc.nbin

Version: 1.67

Type: remote

Family: SCADA

Published: 1/13/2016

Updated: 5/20/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 6.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/h:janitza:umg_509, cpe:/h:janitza:umg_511, cpe:/h:janitza:umg_604, cpe:/h:janitza:umg_508, cpe:/h:janitza:umg_605

Exploit Ease: No known exploits are available

Patch Publication Date: 9/21/2015

Vulnerability Publication Date: 10/22/2015

Reference Information

CVE: CVE-2015-3971

BID: 77291