First published: Mon Oct 08 2018(Updated: )
The Auto-Maskin DCU 210E, RP-210E, and Marine Pro Observer Android App transmit sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors. The devices transmit process control information via unencrypted Modbus communications. Impact: An attacker can exploit this vulnerability to observe information about configurations, settings, what sensors are present and in use, and other information to aid in crafting spoofed messages. Requires access to the network. Affected releases are Auto-Maskin DCU-210E, RP-210E, and Marine Pro Observer Android App. Versions prior to 3.7 on ARMv7.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Auto-maskin Rp 210e Firmware | ||
Arm Arm7 | <3.7 | |
Auto-maskin Rp 210e | ||
Auto-maskin Dcu 210e Firmware | ||
Auto-Maskin DCU 210E | ||
Auto-maskin Marine Pro Observer |
The devices should implement Modbus TCP Security Protocol (v21, 2018) per Modbus specifications over port 802 TCP, for Modbus TCP with encryption and authentication.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.