GarrettCom created a patch that mitigates the privilege-escalation vulnerability in the Magnum MNS-6K Management Software application via the use of a hard-coded password that could allow a remote attacker with any level of access to the system to escalate the attacker’s privilege to the administrative level.
To take advantage of the hole, discovered by independent security researcher Justin W. Clarke of Cylance Inc., an attacker must have access to a logon account on the device to exploit this vulnerability, according to a report on ICS-CERT.
GarrettCom products affected by the hole are the MNS-6K Rel, v4.1.14, and prior, and MNS-6K Rel, v14.1.14 SECURE and prior.
Successful exploitation of this vulnerability from an established account on the system could allow escalation of privileges to full administrative access. The privilege escalation could provide the attacker a vector for making changes to settings, or initiating a complete device shutdown causing a denial of service (DoS).
GarrettCom is a U.S.-based company with offices also in Europe. The Magnum MNS-6K Management Software provides device management for the Magnum 6K line of managed Ethernet switches.
Resellers also offer GarrettCom products in South America, China, India, and the Middle East, however, GarrettCom estimates the affected products are primarily in the U.S. with a small percentage in Europe and Asia. The 6K line of switches are across several U.S. critical infrastructure sectors including critical manufacturing, defense industrial base, energy, water, and transportation, GarrettCom officials said.
The Magnum MNS-6K Management Software uses an undocumented hard-coded password that could allow an attacker with access to an established device account to escalate privileges to the administrative or full-access level. While an attacker must use an established account on the device under attack, this vulnerability facilitates the circumvention of physical-connect safeguards and could allow complete administrative level access to the system, compromising system confidentiality, integrity, and availability. CVE-2012-3014 is the number assigned to this vulnerability, which has a CVSS v2 base score of 7.7.
An attacker with a low skill could exploit this vulnerability.