Sielco Analog FM Transmitter 2.12 Remote Privilege Escalation
Title: Sielco Analog FM Transmitter 2.12 Remote Privilege Escalation
Advisory ID: ZSL-2023-5755
Type: Local/Remote
Impact: Privilege Escalation
Risk: (4/5)
Release Date: 28.03.2023
2.12 (EXC120GX)
2.11 (EXC300GX)
2.10 (EXC1600GX)
2.10 (EXC2000GX)
2.08 (EXC1600GX)
2.08 (EXC1000GX)
2.07 (EXC3000GX)
2.06 (EXC5000GX)
1.7.7 (EXC30GT)
1.7.4 (EXC300GT)
1.7.4 (EXC100GT)
1.7.4 (EXC5000GT)
1.6.3 (EXC1000GT)
1.5.4 (EXC120GT)
Web/3.0.3
[27.01.2023] Contact with the vendor and CSIRT Italia.
[27.03.2023] No response from the vendor.
[27.03.2023] No response from the CSIRT team.
[28.03.2023] Public security advisory released.
[2] https://packetstormsecurity.com/files/171842/
[3] https://cxsecurity.com/issue/WLB-2023040059
[4] https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08
[5] https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-41966
[6] https://nvd.nist.gov/vuln/detail/CVE-2023-41966
[7] https://exchange.xforce.ibmcloud.com/vulnerabilities/253074
[8] https://exchange.xforce.ibmcloud.com/vulnerabilities/269709
[02.11.2023] - Added reference [1], [2], [3], [4], [5], [6], [7] and [8]
Web: https://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2023-5755
Type: Local/Remote
Impact: Privilege Escalation
Risk: (4/5)
Release Date: 28.03.2023
Summary
Sielco designs and produces FM radio transmitters for professional broadcasting. The in-house laboratory develops standard and customised solutions to meet all needs. Whether digital or analogue, each product is studied to ensure reliability, resistance over time and a high standard of safety. Sielco transmitters are distributed throughout the world and serve many radios in Europe, South America, Africa, Oceania and China.Description
The application suffers from a privilege escalation vulnerability. A user with Read permissions can elevate his/her privileges by sending a HTTP POST request setting the parameter 'auth1' or 'auth2' or 'auth3' to integer value '1' for Write or '2' for Admin permissions.Vendor
Sielco S.r.l - https://www.sielco.orgAffected Version
2.12 (EXC5000GX)2.12 (EXC120GX)
2.11 (EXC300GX)
2.10 (EXC1600GX)
2.10 (EXC2000GX)
2.08 (EXC1600GX)
2.08 (EXC1000GX)
2.07 (EXC3000GX)
2.06 (EXC5000GX)
1.7.7 (EXC30GT)
1.7.4 (EXC300GT)
1.7.4 (EXC100GT)
1.7.4 (EXC5000GT)
1.6.3 (EXC1000GT)
1.5.4 (EXC120GT)
Tested On
lwIP/2.1.1Web/3.0.3
Vendor Status
[26.01.2023] Vulnerability discovered.[27.01.2023] Contact with the vendor and CSIRT Italia.
[27.03.2023] No response from the vendor.
[27.03.2023] No response from the CSIRT team.
[28.03.2023] Public security advisory released.
PoC
sielco_fm_eop.htmlCredits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>References
[1] https://www.exploit-db.com/exploits/51366[2] https://packetstormsecurity.com/files/171842/
[3] https://cxsecurity.com/issue/WLB-2023040059
[4] https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08
[5] https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-41966
[6] https://nvd.nist.gov/vuln/detail/CVE-2023-41966
[7] https://exchange.xforce.ibmcloud.com/vulnerabilities/253074
[8] https://exchange.xforce.ibmcloud.com/vulnerabilities/269709
Changelog
[28.03.2023] - Initial release[02.11.2023] - Added reference [1], [2], [3], [4], [5], [6], [7] and [8]
Contact
Zero Science LabWeb: https://www.zeroscience.mk
e-mail: lab@zeroscience.mk