CVE-2018-25237
Hirschmann · HiSecOS
A buffer overflow in the Hirschmann HiSecOS HTTPS login interface, occurring when RADIUS is enabled, allows remote attackers to crash the device or execute arbitrary code.
Executive summary
Hirschmann HiSecOS devices are vulnerable to a critical buffer overflow that allows remote attackers to achieve code execution or cause a permanent denial of service.
Vulnerability
When RADIUS authentication is active, the HTTPS login interface fails to perform bounds checking on password inputs. Submitting a password exceeding 128 characters triggers a buffer overflow.
Business impact
An attacker can exploit this to gain remote code execution or render the security device inoperable (Denial of Service). Given the CVSS score of 9.8, this represents a critical threat to the availability and integrity of the network security perimeter.
Remediation
Immediate Action: Update HiSecOS firmware to version 05.3.03 or later. If updating is not immediately possible, consider temporarily disabling RADIUS authentication if an alternative exists.
Proactive Monitoring: Monitor system logs for device crashes or repeated failed login attempts involving unusually long character strings.
Compensating Controls: Use a Web Application Firewall or specialized IPS signatures to drop HTTPS POST requests to the login page that contain excessively long password fields.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Buffer overflows in authentication interfaces are highly dangerous. Administrators must prioritize the firmware update to version 05.3.03 to ensure the stability and security of their HiSecOS deployments.