Overview
Digital Alert Systems DASDEC and Monroe Electronics One-Net E189 Emergency Alert System (EAS) devices exposed a shared private root SSH key in publicly available firmware images. An attacker with SSH access to a device could use the key to log in with root privileges.
Description
The Digital Alert Systems DASDEC-I and DASDEC-II and Monroe Electronics R189 One-Net/R189SE One-NetSE are Linux-based EAS encoder/decoder (ENDEC) devices that are used to broadcast EAS messages over digital and analog channels. IOActive has reported several security issues affecting these devices. The most severe of these issues is the public disclosure of the default private root SSH key. The less severe issues could also contribute to an attacker's ability to compromise a vulnerable device. Compromised root SSH key (CVE-2013-0137) |
Impact
An attacker with the private key and SSH access can log in to a device with root privileges. |
Solution
Apply an update |
Restrict access |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 10 | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Temporal | 8.7 | E:ND/RL:OF/RC:C |
Environmental | 6.8 | CDP:LM/TD:M/CR:ND/IR:M/AR:ND |
References
- http://www.monroe-electronics.com/EAS_pages/prod_r189se.html
- http://www.digitalalertsystems.com/products_enc-dec.html
- http://www.monroe-electronics.com/MONROE_ELECTRONICS_PDF/130604-Monroe-Security-PR.pdf
- http://www.digitalalertsystems.com/pdf/130604-Monroe-Security-PR.pdf
- http://www.digitalalertsystems.com/pdf/wpdas-122.pdf
- http://www.fcc.gov/guides/emergency-alert-system-eas
- http://www.ioactive.com/news-events/ioactive_uncovers_vulnerabilities_in_united_states_emergency_alerting_system.html
- http://www.ioactive.com/pdfs/IOActive_DASDEC_vulnerabilities.pdf
- http://blog.ioactive.com/2013/10/strike-two-for-emergency-alerting.html
- http://blog.ioactive.com/2013/07/why-vendor-openness-still-matters.html
- http://www.commlawblog.com/2013/02/articles/broadcast/fcc-urges-broadcasters-to-secure-eas-equipment/
- http://www.broadcastlawblog.com/2013/02/articles/emergency-communications/hackers-use-eas-to-send-alert-of-zombie-attack-fcc-issues-urgent-warning-to-broadcasters-to-secure-their-eas-systems/
- http://www.radioworld.com/article/eas-hack-cap-not-the-issue-internet-security-is/217746
- http://www.radioworld.com/article/stations-urged-to-protect-their-eas/217746
- http://transition.fcc.gov/pshs/techtopics/techtopics21.html
- http://www.thebdr.net/articles/fcc/eas/eas.html
- http://www.thebdr.net/articles/fcc/eas/EAS-Q5.pdf
- http://cwe.mitre.org/data/definitions/798.html
- http://cwe.mitre.org/data/definitions/532.html
- http://cwe.mitre.org/data/definitions/341.html
- http://cwe.mitre.org/data/definitions/320.html
- http://cwe.mitre.org/data/definitions/321.html
- http://www.us-cert.gov/ncas/alerts/TA13-175A
- http://www.cert.org/downloads/vuls/662676/ssh-key-test.sh
- https://raw.github.com/aspiers/ssh-config/master/bin/ssh-list-pubkeys
- http://www.wired.com/threatlevel/2013/07/eas-holes/
Acknowledgements
Thanks to Mike Davis and Cesar Cerrudo of IOActive for reporting these issues. Thanks also to Monroe Electronics for their efforts to contact affected users.
This document was written by Art Manion.
Other Information
CVE IDs: | CVE-2013-0137 |
Date Public: | 2013-06-24 |
Date First Published: | 2013-06-26 |
Date Last Updated: | 2014-05-07 22:19 UTC |
Document Revision: | 96 |