ID CVE-2018-5402
Summary The Auto-Maskin DCU 210E, RP-210E, and Marine Pro Observer Android App use an embedded webserver that uses unencrypted plaintext for the transmission of the administrator PIN Impact: An attacker once authenticated can change configurations, upload new configuration files, and upload executable code via file upload for firmware updates. Requires access to the network. Affected releases are Auto-Maskin DCU-210E, RP-210E, and the Marine Pro Observer Android App. Versions prior to 3.7 on ARMv7.
References
Vulnerable Configurations
  • cpe:2.3:o:auto-maskin:rp_210e_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:auto-maskin:rp_210e_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:arm:arm7:*:*:*:*:*:*:*:*
    cpe:2.3:h:arm:arm7:*:*:*:*:*:*:*:*
  • cpe:2.3:h:auto-maskin:rp_210e:-:*:*:*:*:*:*:*
    cpe:2.3:h:auto-maskin:rp_210e:-:*:*:*:*:*:*:*
  • cpe:2.3:o:auto-maskin:dcu_210e_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:auto-maskin:dcu_210e_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:auto-maskin:dcu_210e:-:*:*:*:*:*:*:*
    cpe:2.3:h:auto-maskin:dcu_210e:-:*:*:*:*:*:*:*
  • cpe:2.3:a:auto-maskin:marine_pro_observer:-:*:*:*:*:android:*:*
    cpe:2.3:a:auto-maskin:marine_pro_observer:-:*:*:*:*:android:*:*
CVSS
Base: 6.5 (as of 09-10-2019 - 23:41)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:S/C:P/I:P/A:P
refmap via4
cert-vn VU#176301
misc https://www.us-cert.gov/ics/advisories/icsa-20-051-04
Last major update 09-10-2019 - 23:41
Published 08-10-2018 - 15:29
Last modified 09-10-2019 - 23:41
Back to Top