Sielco Analog FM Transmitter 2.12 \’id\’ Cookie Brute Force Session Hijacking

Title: Sielco Analog FM Transmitter 2.12 \’id\’ Cookie Brute Force Session Hijacking
Advisory ID: ZSL-2023-5758
Type: Local/Remote
Impact: Security Bypass
Risk: (4/5)
Release Date: 28.03.2023

Summary

Sielco designs and produces FM radio transmittersfor professional broadcasting. The in-house laboratory developsstandard and customised solutions to meet all needs. Whetherdigital or analogue, each product is studied to ensure reliability,resistance over time and a high standard of safety. Sielcotransmitters are distributed throughout the world and servemany radios in Europe, South America, Africa, Oceania and China.

Description

The Cookie session ID \’id\’ is of an insufficient length andcan be exploited by brute force, which may allow a remote attackerto obtain a valid session, bypass authentication and manipulatethe transmitter.

Vendor

Sielco S.r.l – https://www.sielco.org

Affected Version

2.12 (EXC5000GX)
2.12 (EXC120GX)
2.11 (EXC300GX)
2.10 (EXC1600GX)
2.10 (EXC2000GX)
2.08 (EXC1600GX)
2.08 (EXC1000GX)
2.07 (EXC3000GX)
2.06 (EXC5000GX)
1.7.7 (EXC30GT)
1.7.4 (EXC300GT)
1.7.4 (EXC100GT)
1.7.4 (EXC5000GT)
1.6.3 (EXC1000GT)
1.5.4 (EXC120GT)

Tested On

lwIP/2.1.1
Web/3.0.3

Vendor Status

[26.01.2023] Vulnerability discovered.
[27.01.2023] Contact with the vendor and CSIRT Italia.
[27.03.2023] No response from the vendor.
[27.03.2023] No response from the CSIRT team.
[28.03.2023] Public security advisory released.

PoC

sielco_fm_sess.txt

Credits

Vulnerability discovered by Gjoko Krstic – <gjoko@zeroscience.mk>

References

[1] https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5613.php

Changelog

[28.03.2023] – Initial release

Contact

Zero Science Lab

Web: https://www.zeroscience.mk
e-mail: lab@zeroscience.mk


Source: php.8575-3202-LSZ/seitilibarenluv/ne/km.ecneicsorez.www

© 版权声明
THE END
喜欢就支持一下吧
点赞7 分享