Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

SenNet Data Logger Appliances and Electricity Meters Multiple Vulnerabilities

Information

Severity

Severity

Critical

Family

Family

Gain a shell remotely

CVSSv2 Base

CVSSv2 Base

10.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

6 years ago

Modified

Modified

5 years ago

Summary

The remote SenNet Appliances is affected by multiple vulnerabilities.

Insight

Insight

Vulnerability Details 1. No access control on the remote shell The appliance runs ARM as underlying OS. Telnet access is enabled on TCP port 5000. There is no authentication required for accessing and connecting the remote shell. Any user can connect to the shell and issue commands. 2. Shell services running with excessive privileges (superuser) The service runs with superuser root privileges, thus giving privileged access to any user, without any authentication (exploited via OS Command Injection described nexe). 3. OS Command Injection The remote shell (attempts to) offer a restricted environment, and does not allow executing system commands. However, it is possible to break out of this jailed shell by chaining specific shell meta-characters and OS commands. The service / application is run as 'root' and OS command injection results in full system access.

Affected Software

Affected Software

SenNet Optimal DataLogger appliance SenNet Solar DataLogger appliance SenNet Multitask Meter

Detection Method

Detection Method

Try to connect to TCP port 5000 and execute the `id` command.

Solution

Solution

Vendor has released a fix.