Headline
Sielco Radio Link 2.06 'id' Cookie Brute Force Session Hijacking
The Cookie session ID ‘id’ is of an insufficient length and can be exploited by brute force, which may allow a remote attacker to obtain a valid session, bypass authentication and manipulate the transmitter.
Title: Sielco Radio Link 2.06 ‘id’ Cookie Brute Force Session Hijacking
Advisory ID: ZSL-2023-5762
Type: Local/Remote
Impact: Security Bypass
Risk: (4/5)
Release Date: 30.03.2023
Summary
Sielco develops and produces radio links for all transmission and reception needs, thanks to innovative units and excellent performances, accompanied by a high reliability and low consumption.
Description
The Cookie session ID ‘id’ is of an insufficient length and can be exploited by brute force, which may allow a remote attacker to obtain a valid session, bypass authentication and manipulate the transmitter.
Vendor
Sielco S.r.l - https://www.sielco.org
Affected Version
2.06 (RTX19)
2.05 (RTX19)
2.00 (EXC19)
1.60 (RTX19)
1.59 (RTX19)
1.55 (EXC19)
Tested On
lwIP/2.1.1
Web/2.9.3
Vendor Status
[26.01.2023] Vulnerability discovered.
[27.01.2023] Contact with the vendor and CSIRT Italia.
[29.03.2023] No response from the vendor.
[29.03.2023] No response from the CSIRT team.
[30.03.2023] Public security advisory released.
PoC
sielco_rl_sess.txt
Credits
Vulnerability discovered by Gjoko Krstic - <[email protected]>
References
N/A
Changelog
[30.03.2023] - Initial release
Contact
Zero Science Lab
Web: https://www.zeroscience.mk
e-mail: [email protected]