1. EXECUTIVE SUMMARY
- CVSS v3 5.9
- ATTENTION: Exploitable remotely/public exploits are available
- Vendor: Dingtian
- Equipment: DT-R002
- Vulnerability: Authentication Bypass by Capture-Replay
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker to bypass authentication.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
The following versions of Dingtian DT-R002, a relay board, are affected:
- DT-R002: version 3.1.276A
3.2 Vulnerability Overview
3.2.1 AUTHENTICATION BYPASS BY CAPTURE-REPLAY CWE-294
relay_cgi.cgi on Dingtian DT-R002 2CH relay devices with firmware 3.1.276A allows an attacker to replay HTTP post requests without the need for authentication or a valid signed/authorized request.
CVE-2022-29593 has been assigned to this vulnerability. A CVSS v3.1 base score of 5.9 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
3.3 BACKGROUND
- CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing
- COUNTRIES/AREAS DEPLOYED: Unknown
- COMPANY HEADQUARTERS LOCATION: China
3.4 RESEARCHER
CISA discovered a public Proof of Concept (PoC) as authored by Victor Hanna of Trustwave SpiderLabs.
4. MITIGATIONS
Dingtian has not responded to requests to work with CISA to mitigate this vulnerability. Users of affected versions of Dingtian DT-R002 are invited to contact Dingtian customer support for additional information.
CISA recommends users take defensive measures to minimize the risk o
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: