CVE-2020-37216
Hirschmann · HiOS
A late-disclosure vulnerability in Hirschmann HiOS devices prior to version 08 poses a high-severity risk to network infrastructure security.
Executive summary
Older versions of Hirschmann HiOS firmware are subject to a high-severity vulnerability that could facilitate unauthorized access to industrial network devices.
Vulnerability
This vulnerability affects legacy versions of the HiOS firmware. Although it was disclosed late, the CVSS score of 7.5 indicates a significant flaw that likely permits an attacker to bypass security controls or impact device availability.
Business impact
The presence of this vulnerability in industrial switches can lead to unauthorized network control and potential disruption of critical OT processes. The high severity reflects the risk of long-term exposure in environments where firmware updates are infrequently applied, potentially leading to persistent unauthorized access.
Remediation
Immediate Action: Immediately upgrade all Hirschmann HiOS devices to version 08 or higher to remediate this long-standing vulnerability.
Proactive Monitoring: Conduct a thorough audit of network device logs for any historical signs of unauthorized access or unusual configuration changes.
Compensating Controls: Implement network segmentation to isolate vulnerable legacy devices and use hardware-based firewalls to restrict management traffic.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The age and severity of this vulnerability make immediate patching mandatory for any remaining legacy installations. Organizations must transition away from HiOS versions prior to 08 to ensure the security of their network infrastructure.