Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Several Vulnerabilities Found in eWON Industrial Routers

eWON industrial routers

A researcher has identified half a dozen vulnerabilities, including ones rated high severity by ICS-CERT, in industrial routers from eWON.

eWON industrial routers

A researcher has identified half a dozen vulnerabilities, including ones rated high severity by ICS-CERT, in industrial routers from eWON.

eWON is a Belgium-based company that specializes in industrial VPN routers and remote connectivity solutions designed for connecting industrial machines securely to the Internet. Its products are used in sectors such as transportation, textiles, robotics, water and wastewater, oil and gas, medical, energy, renewable energy, and food and beverage.

According to ICS-CERT, independent researcher Karn Ganeshen identified several vulnerabilities in the firmware running on eWON’s industrial routers. The vendor has released a firmware update to patch some of the flaws and provided mitigation advice for the unpatched issues.

The most serious of the vulnerabilities, with a CVSS score of 9.9 assigned by ICS-CERT, is a user rights management issue (CVE-2015-7926) that can be exploited by an unauthenticated attacker using a forged URL. eWON says the flaw allows an attacker to gather information and status on I/O servers, and change I/O server configuration parameters or delete some users.

Another issue rated high severity is related to the transmission of passwords in clear text (CVE-2015-7928), which allows a man-in-the-middle (MitM) attacker to intercept the information. Furthermore, some pages in the eWON web application, such as the user setup page, include an autocomplete feature that exposes passwords.

Ganeshen also identified a cross-site request forgery (CSRF) vulnerability that can be exploited to perform actions on a targeted user’s behalf (CVE-2015-7925). In theory, an attacker who can trick the victim into triggering a malicious request can execute firmware updates, reboot the device, or delete device configuration, but eWON noted in its own advisory that several requirements have to be met for an attack to work.

A stored cross-site scripting (XSS) issue has been found in the web application’s configuration fields, but eWON doesn’t see it as a real threat since it claims an attack can only be conducted by a user that has administrative privileges and who can get configuration changes right.

The expert also reported finding a weak session management issue that causes the session to remain active even after the user clicks the “log off” button. The session is only invalidated after the browser is closed.

Advertisement. Scroll to continue reading.

The least serious issue is related to the fact that the web server allows the replacement of the POST method with the GET method in a request. The problem is that GET exposes information in the URL and the weakness could be used in combination with the CSRF vulnerability.

Some of these vulnerabilities affect all eWON devices, while others only impact the Flexy and CD models. The security holes plague eWON firmware versions prior to 10.1s0.

Firmware version 10.1s0 patches the password visibility, the user rights management, and browser session issues. In its advisory, eWON noted that the other vulnerabilities, such as the XSS and CSRF weaknesses, are either difficult to exploit or they don’t pose a serious threat.

The company has advised customers to always connect to eWON products via a secured LAN or VPN.

Learn More at the ICS Cyber Security Conference

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

Municipal Water Authority of Aliquippa in Pennsylvania confirms that hackers took control of a booster station, but says no risk to drinking water or...

ICS/OT

Mandiant's Chief analyst urges critical infrastructure defenders to work on finding and removing traces of Volt Typhoon, a Chinese government-backed hacking team caught in...

Cybercrime

Energy giants Schneider Electric and Siemens Energy confirm being targeted by the Cl0p ransomware group in the campaign exploiting a MOVEit zero-day.

ICS/OT

Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).

ICS/OT

As smart cities evolve with more and more integrated connected services, cybersecurity concerns will increase dramatically.