First published: Mon Oct 08 2018(Updated: )
The Auto-Maskin DCU 210E firmware contains an undocumented Dropbear SSH server, v2015.55, configured to listen on Port 22 while the DCU is running. The Dropbear server is configured with a hard-coded user name and password combination of root / amroot. The server is configured to use password only authentication not cryptographic keys, however the firmware image contains an RSA host-key for the server. An attacker can exploit this vulnerability to gain root access to the Angstrom Linux operating system and modify any binaries or configuration files in the firmware. Affected releases are Auto-Maskin DCU-210E RP-210E: Versions prior to 3.7 on ARMv7.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Auto-Maskin DCU-210E firmware | <3.7 | |
Auto-Maskin DCU 210E | ||
Auto-Maskin RP 210E firmware | <3.7 | |
Auto-Maskin RP 210E firmware |
End-users should log-in via the SSH server and remove it as a service, or change the hard-coded password to SP 800-63B standards.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-5399 is considered a critical vulnerability due to the presence of hard-coded credentials in the Dropbear SSH server.
To mitigate CVE-2018-5399, users should upgrade the Auto-Maskin DCU 210E firmware to a version that does not include this vulnerability.
CVE-2018-5399 affects the Auto-Maskin DCU 210E and RP 210E firmware versions prior to 3.7.
Using the Auto-Maskin DCU 210E with CVE-2018-5399 poses significant security risks due to the exposure of hard-coded credentials.
The attack vector for CVE-2018-5399 is remote, as it allows unauthorized access via the SSH server listening on Port 22.