This website uses cookies

Our website, platform and/or any sub domains use cookies to understand how you use our services, and to improve both your experience and our marketing relevance.

Secure Any CMS With Ease with Our Malware Protection Add-On! LEARN MORE→

Vulnerabilities in Ewon Cosy+ Industrial Tool Expose Devices to Root Access Attacks

Updated on August 12, 2024

2 Min Read

Get an AI Summary of This Article

Want a quick summary? Let AI help you digest the key points from this article.

Summarize in

or

Security flaws have been identified in the Ewon Cosy+ industrial remote access solution, potentially allowing attackers to gain root privileges on the devices and conduct further malicious activities.

These vulnerabilities could be exploited to decrypt encrypted firmware and data, such as passwords, and even obtain correctly signed X.509 VPN certificates to hijack VPN sessions, posing serious security risks to both users and adjacent industrial infrastructures.

via GIPHY

The vulnerabilities were disclosed by SySS GmbH security researcher Moritz Abrell during the DEF CON 32 conference. The flaws include an operating system command injection vulnerability and a filter bypass, which could be used to execute a reverse shell by uploading a manipulated OpenVPN configuration.

Additionally, a persistent cross-site scripting (XSS) vulnerability and unprotected cookies containing Base64-encoded credentials allow an unauthenticated attacker to gain administrative access and ultimately root the device.

The attack chain can be extended further to establish persistence, access firmware-specific encryption keys, and decrypt firmware update files. Moreover, the exploitation of a hard-coded key within the binary for password encryption could enable attackers to extract sensitive secrets.

A critical aspect of this vulnerability is the communication between Cosy+ devices and the Talk2m API, which relies on HTTPS and mutual TLS (mTLS) authentication. However, the use of a device’s serial number as the sole identifier in certificate signing requests (CSR) can be exploited, allowing an attacker to initiate their own VPN session, effectively hijacking the original connection and accessing the target’s network services, such as RDP or SMB.

These vulnerabilities underscore the need for enhanced security measures in industrial remote access solutions to prevent potential exploitation by malicious actors.

Get an AI Summary of This Article

Want a quick summary? Let AI help you digest the key points from this article.

Share your opinion in the comment section. COMMENT NOW

Share This Article

Start Growing with Cloudways Today.

Our Clients Love us because we never compromise on these

Abdul Rehman

Abdul is a tech-savvy, coffee-fueled, and creatively driven marketer who loves keeping up with the latest software updates and tech gadgets. He's also a skilled technical writer who can explain complex concepts simply for a broad audience. Abdul enjoys sharing his knowledge of the Cloud industry through user manuals, documentation, and blog posts.

×

Webinar: How to Get 100% Scores on Core Web Vitals

Join Joe Williams & Aleksandar Savkovic on 29th of March, 2021.

Do you like what you read?

Get the Latest Updates

Share Your Feedback

Please insert Content

Thank you for your feedback!

Do you like what you read?

Get the Latest Updates

Share Your Feedback

Please insert Content

Thank you for your feedback!

Want to Experience the Cloudways Platform in Its Full Glory?

Take a FREE guided tour of Cloudways and see for yourself how easily you can manage your server & apps on the leading cloud-hosting platform.

Start my tour
This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.