Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-4291: VDE-2023-038 | CERT@VDE

Frauscher Sensortechnik GmbH FDS101 for FAdC/FAdCi v1.4.24 and all previous versions are vulnerable to a remote code execution (RCE) vulnerability via manipulated parameters of the web interface without authentication. This could lead to a full compromise of the FDS101 device.

CVE
#sql#vulnerability#web#rce#auth

2023-09-21 08:00 (CEST) VDE-2023-038

Frauscher: Multiple Vulnerabilities in FDS101
Share: Email | Twitter

**

Published

**

2023-09-21 08:00 (CEST)

**

Last update

**

2023-09-21 07:26 (CEST)

Vendor(s)

Frauscher Sensortechnik GmbH

Product(s)

Article No°

Product Name

Affected Version(s)

FDS101 for FAdC/FAdCi

<= 1.4.24

**

Summary

**

Frauscher Sensortechnik GmbH FDS101 for FAdC/FAdCi v1.4.24 and all previous versions are prone to multiple vulnerabilities which could lead up to a full compromise of the FDS101 device.

**

Vulnerabilities

**

Last Update

Sept. 7, 2023, 10:27 a.m.

Weakness

Improper Control of Generation of Code (‘Code Injection’) (CWE-94)

Summary

Frauscher Sensortechnik GmbH FDS101 for FAdC/FAdCi v1.4.24 and all previous versions are vulnerable to a remote code execution (RCE) vulnerability via manipulated parameters of the web interface without authentication. This could lead to a full compromise of the FDS101 device.

Last Update

Sept. 7, 2023, 10:27 a.m.

Weakness

Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) (CWE-22)

Summary

Frauscher Sensortechnik GmbH FDS101 for FAdC/FAdCi v1.4.24 and all previous versions are vulnerable to a path traversal vulnerability of the web interface by a crafted URL without authentication. This enables an remote attacker to read all files on the filesystem of the FDS101 device.

Last Update

Sept. 7, 2023, 10:28 a.m.

Weakness

Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) (CWE-89)

Summary

Frauscher Sensortechnik GmbH FDS101 for FAdC/FAdCi v1.4.24 and all previous versions are vulnerable to a SQL injection vulnerability via manipulated parameters of the web interface without authentication. The database contains limited, non-critical log information.

**

Impact

**

Please consult the CVE Entries above.

**

Solution

**

Mitigation

Security-related application conditions SecRAC

The railway operator must ensure that only authorised personnel or people in the company of authorised personnel have access to the Frauscher Diagnostic System FDS101.

The recommendation is to connect the Frauscher Diagnostic System FDS101 to a network of category 2.

If the Frauscher Diagnostic System FDS101 is connected to a network of category 3 (according to EN 50159:2010), then additional protective measures must be added.

Remediation

Update to FDS102 v2.10.1 or higher

**

Reported by

**

CERT@VDE coordinated with Frauscher Sensortechnik GmbH.

Related news

Google Fixes Nearly 100 Android Security Issues

Plus: Apple shuts down a Flipper Zero Attack, Microsoft patches more than 30 vulnerabilities, and more critical updates for the last month of 2023.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907