There is an insufficient entropy vulnerability in Innominate’s mGuard network appliance product line, according to a report on ICS-CERT.
By impersonating the device, an attacker can obtain the credentials of administrative users and potentially perform a Man-in-the-Middle (MitM) attack. Innominate has validated the remotely exploitable vulnerability, found by an independent research group consisting of Nadia Heninger, Zakir Durumeric, Eric Wustrow, and J. Alex Halderman, and produced an update that resolves the vulnerability.
ICS-CERT has coordinated this vulnerability with Innominate, which created an update that resolves this vulnerability.
All versions of the following Innominate products suffer from the issue:
• mGuard Smart HW-101020, HW-101050, BD-101010, BD-101020,
• mGuard PCI-HW-102020, HW-102050, BD-111010, BD-111020,
• mGuard Industrial RS-HW-105000, BD-501000, BD-501010, BD-501020,
• mGuard Blade-HW-104020, HW-104050,
• mGuard Delta-HW-103050, BD-201000,
• EAGLE mGuard-HW-201000, BD-301010,
• All products manufactured prior to 2006.
This vulnerability can weaken the security posture of any industrial network in which these products are deployed.
Berlin, Germany-based Innominate started up in 2001 and its mGuard product line includes firewall and VPN network security appliances. Innominate’s products are in sectors including manufacturing, electric power generation, water, transportation, healthcare, communications, and satellite operations. The mGuard products see use in multiple countries worldwide.
The mGuard products do not use sufficient entropy when generating keys for HTTPS and SSH, therefore making them too weak. By calculating private keys, an attacker could perform a MitM attack on the system. This could allow the attacker to execute arbitrary code or gain unauthorized access to the system. Keys loaded as part of the mGuard configuration (i.e., VPN) are not affected.
CVE-2012-3006 is the number assigned to this vulnerability, which has a CVSS v2 base score of 7.1.
An attacker can predict the user’s session ID and potentially hijack the session. An attacker can exploit this remotely via a MitM type attack. An attacker that obtains unauthorized access could inject malicious code or change system settings.
The attacker must first successfully guess or calculate the private key of the mGuard device and have physical access to the network path between the device and a legitimate administrator or have the ability to deviate legitimate device traffic to the attacker’s system using techniques such as ARP spoofing.
An attacker with a high skill level would be able to exploit this vulnerability.
Software Version 7.5.0 or later properly uses existing entropy before generating HTTPS and SSH keys. It also increases the size of the RSA keys from 1,024 bits to 2,048 bits. The software update can be found at Innominate download website. Innominate recommends changing passwords after generating new keys.