CVE-2020-37216

Hirschmann · HiOS

A late-disclosure vulnerability in Hirschmann HiOS devices prior to version 08 poses a high-severity risk to network infrastructure security.

Executive summary

Older versions of Hirschmann HiOS firmware are subject to a high-severity vulnerability that could facilitate unauthorized access to industrial network devices.

Vulnerability

This vulnerability affects legacy versions of the HiOS firmware. Although it was disclosed late, the CVSS score of 7.5 indicates a significant flaw that likely permits an attacker to bypass security controls or impact device availability.

Business impact

The presence of this vulnerability in industrial switches can lead to unauthorized network control and potential disruption of critical OT processes. The high severity reflects the risk of long-term exposure in environments where firmware updates are infrequently applied, potentially leading to persistent unauthorized access.

Remediation

Immediate Action: Immediately upgrade all Hirschmann HiOS devices to version 08 or higher to remediate this long-standing vulnerability.

Proactive Monitoring: Conduct a thorough audit of network device logs for any historical signs of unauthorized access or unusual configuration changes.

Compensating Controls: Implement network segmentation to isolate vulnerable legacy devices and use hardware-based firewalls to restrict management traffic.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The age and severity of this vulnerability make immediate patching mandatory for any remaining legacy installations. Organizations must transition away from HiOS versions prior to 08 to ensure the security of their network infrastructure.