CVE-2018-25236

Hirschmann · HiOS and HiSecOS (RSP, RSPE, RSPS, RSPL, MSP, EES, EESX, GRS, OS, RED, EAGLE)

An authentication bypass in Hirschmann HiOS and HiSecOS products allows unauthenticated remote attackers to gain administrative access via specially formed HTTP requests.

Executive summary

Multiple Hirschmann networking products are susceptible to a critical authentication bypass in their management interfaces, permitting unauthenticated remote administrative access.

Vulnerability

The HTTP(S) management module fails to properly handle authentication status, allowing unauthenticated attackers to hijack the privileges of previously authenticated users through crafted HTTP requests.

Business impact

An attacker gaining administrative access to industrial networking equipment can intercept traffic, modify network configurations, or cause significant operational downtime. The CVSS score of 9.8 reflects the critical nature of this vulnerability, as it allows for complete device takeover without valid credentials.

Remediation

Immediate Action: Apply the latest firmware updates provided by Hirschmann for all affected HiOS and HiSecOS device models immediately.

Proactive Monitoring: Monitor management interface logs for unusual login patterns or HTTP requests originating from unauthorized network segments.

Compensating Controls: Disable HTTP/HTTPS management interfaces on untrusted networks and utilize out-of-band management or VPNs for administrative access.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The ability to bypass authentication on core industrial networking hardware poses a severe risk to infrastructure stability. Administrators must treat this as a high-priority remediation task and update all affected devices to the latest secure firmware versions.