SCADA Vulnerabilities & Exposures (SVE)

CRITIFENCE® SCADA Vulnerabilities and Exposures Database (SVE)

[SVE-467551002] Korenix JetNet

Date Type Platform Author EDB-ID CVE-ID OSVDB-ID Download App SIS Signature
2017-10-26OtherKorenixMandar Jadhav of the Qualys Vulnerability Signature/Research Team reported these vulnerabilities to ICS-CERT. N/ACVE-2017-1402 CVE-2017-1402 N/AN/AN/A

Source

						
							
								
#
# Korenix JetNet
#


### VULNERABLE VENDOR
Korenix


### VULNERABLE PRODUCT
JetNet



### RESEARCHER
Mandar Jadhav of the Qualys Vulnerability Signature/Research Team reported these vulnerabilities to ICS-CERT.



### AFFECTED PRODUCTS

The following versions of JetNet, an Ethernet switch, are affected:

JetNet5018G version 1.4,
JetNet5310G version 1.4a,
JetNet5428G-2G-2FX version 1.4,
JetNet5628G-R version 1.4,
JetNet5628G version 1.4,
JetNet5728G-24P version 1.4,
JetNet5828G version 1.1d,
JetNet6710G-HVDC version 1.1e, and
JetNet6710G version 1.1



### IMPACT

Successful exploitation of these vulnerabilities could allow a remote attacker to gain remote access to the device to run arbitrary code and perform man-in-the-middle attacks.



### VULNERABILITY OVERVIEW

USE OF HARD-CODED CRYPTOGRAPHIC KEY CWE-321
An attacker may gain access to hard-coded certificates and private keys allowing the attacker to perform man-in-the-middle attacks.
CVE-2017-14021 has been assigned to this vulnerability.
A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)


USE OF HARD-CODED CREDENTIALS CWE-798
The software uses undocumented hard-coded credentials that may allow an attacker to gain remote access.
CVE-2017-14027 has been assigned to this vulnerability.
A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)





### BACKGROUND

Critical Infrastructure Sectors: Commercial Facilities, Critical Manufacturing, and Transportation Systems
Countries/Areas Deployed: Worldwide
Company Headquarters Location: Walnut, California




### MITIGATION

Korenix has produced new firmware that removes the undocumented hard-coded credentials from supported systems. The new firmware is available for download at:

http://www.korenix.com/upload/doc/FW_JetNet5310G_V2.0.rar


Korenix recommends that affected users use the software support certificate replacement feature to change certificates on affected devices.

Users can find customer support links for Korenix at: http://www.korenix-usa.com/contact-us.php