Schweitzer Engineering Laboratories, Inc. (SEL) has a mitigation plan to help thwart an improper access control vulnerability in its Ethernet gateways, according to a report with ICS-CERT.
The vulnerability, discovered by Jason Holcomb with Revolutionary Security who has tested the patch, could result in unauthorized communications through the affected SEL-3620 and SEL-3622 Ethernet gateways to configured NAT port forwarding destinations.
The following versions of SEL-3620 and SEL-3622, an Ethernet Security Gateway, suffer from the remotely exploitable issue:
• Security Gateway Versions R202
• R203, R203-V1, R203-V2
• R204, R204-V1
No known public exploits specifically target this vulnerability. However, an attacker with low skill level would be able to leverage the vulnerability.
The devices see use mainly in the energy sector and on a global basis.
The device does not properly enforce access control while configured for NAT port forwarding, which may allow for unauthorized communications to downstream devices.
CVE-2017-7928 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 7.2.
Pullman, Washington-based SEL determined that, when NAT port forwarding is not used, all routed traffic ends up filtered properly through the firewall access control lists. If NAT port forwarding is required, SEL recommends users of affected products contact their SEL Sales Representative or Customer Service Representative to obtain a no-cost firmware upgrade CD-ROM packet including upgrade instructions.
Click here for contact information.