{"vuid":"VU#176301","idnumber":"176301","name":"Auto-Maskin DCU 210E RP 210E and Marine Pro Observer App","keywords":["[VRF#18-09-KTDMW]"],"overview":"Auto-Maskin RP remote panels and DCU controls units are used to monitor and control ship engines. The units have several authentication and encryption vulnerabilities which can allow attackers to access the units and control connected engines.","clean_desc":"CWE 798:୕se of Hard-Coded Credentials - CVE–2018-5399 The DCU 210E firmware contains an undocumented Dropbear SSH server with a hardcoded username and password. The password is easily susceptible to cracking. CWE-346:୏rigin Validation Error - CVE–2018-5400 The Auto-Maskin products utilize an undocumented custom protocol to set up Modbus communications with other devices without validating those devices. CWE-319:ୃleartext Transmission of Sensitive Information - CVE–2018-5401 The devices transmit process control information via unencrypted Modbus communications. CWE-319:ୃleartext Transmission of Sensitive Information - CVE–2018-5402 The embedded webserver uses unencrypted plaintext for the transmission of the administrator PIN.","impact":"An attacker can exploit this vulnerability to observe information about configurations, settings, what sensors are present and in use, and other information. An attacker can send arbitrary ModBus (control) information to the engine control units.","resolution":"CERT/CC is currently unaware of an update to address the vulnerabilities.","workarounds":"Critical control devices such as these should only be accessible via private, carefully secured networks.","sysaffected":"","thanks":"Thanks to Brian Satira and Brian Olson for reporting this vulnerability.","author":"This document was written by Dan Klinedinst.","public":[],"cveids":[" CVE–2018-5399","CVE-2018-5400","CVE-2018-5401","CVE-2018-5402"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2018-09-10T14:06:43Z","publicdate":"2018-10-06T00:00:00Z","datefirstpublished":"2018-10-06T23:34:55Z","dateupdated":"2018-10-16T18:51:35Z","revision":16,"vrda_d1_directreport":"1","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"--","cvss_accesscomplexity":"--","cvss_authentication":null,"cvss_confidentialityimpact":"--","cvss_integrityimpact":"--","cvss_availabilityimpact":"--","cvss_exploitablity":null,"cvss_remediationlevel":"ND","cvss_reportconfidence":"ND","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"ND","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"0","cvss_basevector":"AV:--/AC:--/Au:--/C:--/I:--/A:--","cvss_temporalscore":"0","cvss_environmentalscore":"0","cvss_environmentalvector":"CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}