{"vuid":"VU#167623","idnumber":"167623","name":"SHDesigns Resident Download Manager does not authenticate firmware downloads","keywords":["verification","integrity","CWE-494"],"overview":"SHDesigns' Resident Download Manager (as well as the Ethernet Download Manager) does not authenticate firmware downloads before executing code and deploying them to devices.","clean_desc":"CWE-494: Download of Code Without Integrity Check - CVE-2016-6567 SHDesigns' Resident Download Manager provides firmware update capabilities for Rabbit 2000/3000 CPU boards, which according to the reporter may be used in some industrial control and embedded applications. The Resident Download Manager does not verify that the firmware is authentic before executing code and deploying the firmware to devices. A remote attacker with the ability to send UDP traffic to the device may be able to execute arbitrary code on the device. According to SHDesigns' website, the Resident Download Manager and other Rabbit Tools have been discontinued since June 2011.","impact":"A remote attacker with the ability to send UDP traffic to the device may be able to execute arbitrary code on the device.","resolution":"The CERT/CC is currently unaware of a practical solution to this problem. According to the reporter, affected users may disable the network update feature. It is also possible that developers of products using the Resident Download Manager may be able to write a download verification wrapper around the Resident Download Manager library, but may not be practical in all scenarios.","workarounds":"Affected users may also consider the following workaround: Restrict network access Restrict network access to the device containing the Rabbit CPU and Resident Download Manager to a secured LAN segment.","sysaffected":"","thanks":"Thanks to Nolan Ray of NCC Group for reporting this vulnerability.","author":"This document was written by Garret Wassermann.","public":["http://shdesigns.org/rabbit/","https://www.digi.com/products/rabbitprocessor","https://www.digi.com/lp/rabbit","https://cwe.mitre.org/data/definitions/494.html"],"cveids":["CVE-2016-6567","CVE-2007-6759","CVE-2007-6760"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2016-10-18T21:45:30Z","publicdate":"2017-01-31T00:00:00Z","datefirstpublished":"2017-01-31T16:24:15Z","dateupdated":"2017-04-07T20:03:44Z","revision":54,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"C","cvss_availabilityimpact":"C","cvss_exploitablity":null,"cvss_remediationlevel":"U","cvss_reportconfidence":"UR","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"9.3","cvss_basevector":"AV:N/AC:M/Au:N/C:C/I:C/A:C","cvss_temporalscore":"8","cvss_environmentalscore":"5.9842549872","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}