News

Dangerous vulnerability was discovered in Tecson monitoring devices

Instruments for monitoring oil tanks manufactured by the German company Tecson revealed a dangerous vulnerability that allows access to web settings panel without credentials.

For doing so, an attacker will only need to know address of web server and request format that was used.

“Based on the lack of adequately implemented access-control rules, by accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to change the application settings without authenticating at all, which violates originally laid ACL rules”, — reported in Tecson.

While exploiting vulnerability, an attacker can access interface configuration and change settings, including passwords, alert settings, and output status data. Thus, it can affect the planned operations and carry out an attack on automation processes.

Vulnerability received a CVE-2019-12254 identifier; the degree of its danger is estimated at 9.8 points on the CVSS scale. The issue affects Tecson LX-Net, LX-Q-Net, e-litro net, SmartBox4 LAN and SmartBox4 pro LAN devices.

However, manufacturer fixed vulnerability with the release of firmware version 6.3. As a measure to prevent attacks, users are advised to disable port forwarding and remote access to vulnerable devices.

Source: https://cert.vde.com

Daniel Zimmermann

Daniel Zimmermann has been writing on security and malware subjects for many years and has been working in the security industry for over 10 years. Daniel was educated at the Saarland University in Saarbrücken, Germany and currently lives in New York.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Back to top button