Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2018-8862 CVE-2018-8864 |
CWE-ID | CWE-287 CWE-311 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software |
ALERT4000 Hardware solutions / Firmware MHPSS Hardware solutions / Firmware HPSS32 Hardware solutions / Firmware HPSS16 Hardware solutions / Firmware |
Vendor | Acoustic Technology |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU11769
Risk: Low
CVSSv4.0: 2.3 [CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-8862
CWE-ID:
CWE-287 - Improper Authentication
Exploit availability: No
DescriptionThe vulnerability allows an adjacent attacker to bypass security restrictions on the target system.
The weakness exists due to improper authentication. An adjacent attacker can submit specially crafted malicious radio transmissions, bypass authentication and trigger false alarms.
Install update from vendor's website.
Vulnerable software versionsALERT4000: All versions
MHPSS: All versions
HPSS32: All versions
HPSS16: All versions
CPE2.3https://ics-cert.us-cert.gov/advisories/ICSA-18-100-01
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11770
Risk: Low
CVSSv4.0: 2.3 [CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-8864
CWE-ID:
CWE-311 - Missing Encryption of Sensitive Data
Exploit availability: No
DescriptionThe vulnerability allows an adjacent attacker to bypass security restrictions on the target system.
The weakness exists due to missing encryption of sensitive data. An adjacent attacker can submit specially crafted malicious radio transmissions and trigger false alarms.
Install update from vendor's website.
Vulnerable software versionsALERT4000: All versions
MHPSS: All versions
HPSS32: All versions
HPSS16: All versions
CPE2.3https://ics-cert.us-cert.gov/advisories/ICSA-18-100-01
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.