## 1. EXECUTIVE SUMMARY
* **âCVSS v3 7.2**
* **âATTENTION:** Exploitable remotely/low attack complexity
* **âVendor: **Ovarro
* **âEquipment: **TBox RTUs
* **âVulnerabilities:** Missing Authorization, Use of Broken or Risky Cryptographic Algorithm, Inclusion of Functionality from Untrusted Control Sphere, Insufficient Entropy, Improper Authorization, Plaintext Storage of a Password
## 2. RISK EVALUATION
âSuccessful exploitation of these vulnerabilities could result in sensitive system information being exposed and privilege escalation.
## 3. TECHNICAL DETAILS
### 3.1 AFFECTED PRODUCTS
âThe following firmware versions of TBox RTUs are affected:
* âTBox MS-CPU32: Version 1.50.598 and prior (CVE-2023-36607, CVE-2023-36609, CVE-2023-36610, CVE-2023-36611)
* âTBox MS-CPU32-S2: Version 1.50.598 and prior (CVE-2023-36607, CVE-2023-36609, CVE-2023-36610, CVE-2023-36611)
* âTBox LT2: Version 1.50.598 and prior (CVE-2023-36607, CVE-2023-36609, CVE-2023-36610, CVE-2023-36611)
* âTBox TG2: Version 1.50.598 and prior (CVE-2023-36607, CVE-2023-36609, CVE-2023-36610, CVE-2023-36611)
* âTBox RM2: Version 1.50.598 and prior (CVE-2023-36607, CVE-2023-36609, CVE-2023-36610, CVE-2023-36611)
* âTBox MS-CPU32: Version 1.46 through 1.50.598 (CVE-2023-36608)
* âTBox MS-CPU32-S2: Version 1.46 through 1.50.598 (CVE-2023-36608)
* âTBox LT2: Version 1.46 through 1.50.598 (CVE-2023-36608)
* âTBox TG2: Version 1.46 through 1.50.598 (CVE-2023-36608)
* âTBox RM2: Version 1.46 through 1.50.598 (CVE-2023-36608)
* âTBox MS-CPU32: All versions (CVE-2023-3395)
* âTBox MS-CPU32-S2: All versions (CVE-2023-3395)
* âTBox LT2: All versions (CVE-2023-3395)
* âTBox TG2: All versions (CVE-2023-3395)
* âTBox RM2: All versions (CVE-2023-3395)
### 3.2 VULNERABILITY OVERVIEW
**3.2.1 â[MISSING AUTHORIZATION CWE-862]()**
âThe affected TBox RTUs are missing authorization for running some API commands. An attacker running these commands could reveal sensitive information such as software versions and web server file contents.
â[CVE-2023-36607]() has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N]()).
**3.2.2 [USE OF A BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHM CWE-327]()**
âThe affected TBox RTUs store hashed passwords using MD5 encryption, which is an insecure encryption algorithm.
â[CVE-2023-36608]() has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is ([AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N]()).
**3.2.3 â[INCLUSION OF FUNCTIONALITY FROM UNTRUSTED CONTROL SPHERE CWE-829]()**
âThe affected TBox RTUs run OpenVPN with root privileges and can run user defined configuration scripts. An attacker could set up a local OpenVPN server and push a malicious script onto the TBox host to acquire root privileges.
â[CVE-2023-36609]() has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is ([AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H]()).
**3.2.4 [INSUFFICIENT ENTROPY CWE-331]()**
âThe affected TBox RTUs generate software security tokens using insufficient entropy. The random seed used to generate the software tokens is not initialized correctly, and other parts of the token are generated using predictable time-based values. An attacker with this knowledge could successfully brute force the token and authenticate themselves.
â[CVE-2023-36610]() has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been assigned; the CVSS vector string is ([AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N]()).
**3.2.5 â[IMPROPER AUTHORIZATION CWE-285]()**
âThe affected TBox RTUs allow low privilege users to access software security tokens of higher privilege. This could allow an attacker with âuserâ privileges to access files requiring higher privileges by establishing an SSH session and providing the other tokens.
â[CVE-2023-36611]() has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is ([AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N]()).
**3.2.6 â[PLAINTEXT STORAGE OF A PASSWORD CWE-256]()**
âAll versions of the TWinSoft Configuration Tool store encrypted passwords as plaintext in memory. An attacker with access to system files could open a file to load the document into memory, including sensitive information associated with document, such as password. The attacker could then obtain the plaintext password by using a memory viewer.
â[CVE-2023-3395]() has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is ([AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N]()).
### 3.3 BACKGROUND
* **âCRITICAL INFRASTRUCTURE SECTORS: **Water and Wastewater, Energy, Transportation, Communications
* **âCOUNTRIES/AREAS DEPLOYED: **Worldwide
* **âCOMPANY HEADQUARTERS LOCATION: **England
### 3.4 RESEARCHER
âFloris Hendriks and Jeroen Wijenbergh of Radboud University reported these vulnerabilities to CISA.
## 4. MITIGATIONS
âOvarro recommends users update the affected products to the latest version by downloading the newest software version from the [Ovarro website]() in the âCustomer Supportâ section.
âIn addition to applying patches, Ovarro has identified the following workarounds:
âCVE-2023-36607: Disable SSH access through the integrated firewall and disable the user account SSH access by emptying its password in the application.
âCVE-2023-36608: Update to TWinSoft version 12.7.2 or later, which includes firmware version 1.50.598.
âCVE-2023-36609: Update to TWinSoft version 12.7.2 or later, which includes firmware version 1.50.598.
âCVE-2023-36610: Disable SSH access through the integrated firewall and disable the user account SSH access by emptying its password in the application. Setting a password on the application will also cause the retrieved application to be encrypted.
âCVE-2023-36611: Disable SSH access through the integrated firewall and disable the user account SSH access by emptying its password in the application. Setting a password on the application will also cause the retrieved application to be encrypted.
âCVE-2023-3395: Use password protected files within the TBox software. This will prevent attackers from opening files to load passwords into memory in plaintext.
âCISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability these vulnerabilities. Specifically, users should:
* âMinimize network exposure for all control system devices and/or systems, and ensure they are [not accessible from the Internet]().
* âLocate control system networks and remote devices behind firewalls and isolate them from business networks.
* âWhen remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices.
âCISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
âCISA also provides a section for [control systems security recommended practices]() on the ICS webpage at [cisa.gov/ics](). Several CISA products detailing cyber defense best practices are available for reading and download, including [Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies]().
âAdditional mitigation guidance and recommended practices are publicly available on the ICS webpage at [cisa.gov/ics]() in the technical information paper, [ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies]().
âOrganizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.
âNo known public exploits specifically target these vulnerabilities.Read More
References
Back to Main