Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Several Security Bugs Found in GarrettCom Magnum Industrial Switches

Researchers have identified several vulnerabilities in Magnum 6K and Magnum 10K managed ethernet switches produced by Belden GarrettCom. The vendor has released firmware updates to address the security holes.

Researchers have identified several vulnerabilities in Magnum 6K and Magnum 10K managed ethernet switches produced by Belden GarrettCom. The vendor has released firmware updates to address the security holes.

GarrettCom Magnum is a line of managed switches designed for harsh industrial environments. The devices are deployed in the United States in critical infrastructure sectors such as defense industrial base, critical manufacturing, water, energy, and transportation.

According to an advisory published by ICS-CERT, Qualys vulnerability research engineer Ashish Kamble and researcher Eireann Leverett have identified multiple issues affecting Magnum 6K and 10K products running firmware versions prior to 4.5.6. An advisory published by GarrettCom reveals that the vulnerabilities impact the Magnum 10KT, 10KG, 6K32, 6K25, 6K16, 6K8, 6KL, 6KM and 6KQ product lines.

Experts found that the firmware installed on vulnerable switches contains a hardcoded password linked to a privileged account used for maintenance and support (CVE-2015-3959).

Kamble says an attacker can use the password to access the switch, and execute arbitrary commands or shut down the device. The researcher says he has identified 17 Magnum switches connected to the Internet using the Shodan search engine. These devices are still running vulnerable versions of the firmware.

GarrettCom noted that the account for the privileged user is not actually enabled in the operating switch, but agrees that the presence of the password in the firmware is “inappropriate.”

Researchers discovered that the firmware also contains hardcoded RSA private keys and certificate files (CVE-2015-3960).

“An attacker having access to these certificates and keys could not only decrypt the HTTPS secure traffic but also log in via SSH without a username/password to any device running the same version of the firmware,” Kamble said in a blog post.

Advertisement. Scroll to continue reading.

The device’s web server is plagued by denial-of-service (DoS) and cross-site scripting (XSS) vulnerabilities.

The DoS flaw (CVE-2015-3961) can be exploited by issuing a certain form of URL against the web server. This triggers a memory corruption, which can cause the switch to reboot. The XSS vulnerabilities (CVE-2015-3942) exist due to improper sanitization of user input. An unauthenticated attacker can leverage the flaws to execute arbitrary code.

GarrettCom has addressed the security holes with the release of version 4.5.6 of the firmware. The company advises customers to update their installations as soon as possible.

Related: Learn more at the ICS Cyber Security Conference

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.