Twenty Year Anniversary

KATHREIN UFSconnect 916 / 906 DoS / Unauthenticated Actions

KATHREIN UFSconnect 916 / 906 DoS / Unauthenticated Actions
Posted Jul 27, 2017
Authored by T. Weber | Site

KATHREIN UFSconnect 916 and 906 with firmware version 2.23 build 224 suffer from denial of service and unauthenticated access vulnerabilities.

tags | exploit, denial of service, vulnerability
MD5 | ca0531e9beaa5674b87dfd3a24c1b333

KATHREIN UFSconnect 916 / 906 DoS / Unauthenticated Actions

Change Mirror Download
SEC Consult Vulnerability Lab Security Advisory < 20170727-1 >
title: Multiple vulnerabilities
product: KATHREIN - UFSconnect 916, UFSconnect 906
vulnerable version: 2.23 Build 224, 2.22 Build 349
fixed version: -
CVE number:
impact: High
found: 2017-03-06
by: T. Weber (Office Vienna)
SEC Consult Vulnerability Lab

An integrated part of SEC Consult
Bangkok - Berlin - Linz - Luxembourg - Montreal - Moscow
Kuala Lumpur - Singapore - Vienna (HQ) - Vilnius - Zurich


Vendor description:
"As a globally leading specialist, Kathrein has unique know-how: our
business fields cover a wide range of communication technologies. They
produce intelligent solutions for the connected world a and clearly aim to
remain a step ahead. We think ahead to the future of communication


Business recommendation:
The Kathrein receiver series can be controlled via its web interface. It is
intended to control this device also via internet over the Kathrein android
or iOS App. Missing authentication enables an attacker to control all Kathrein
UFS receivers over the web interface via port 9000/TCP. Actions like switch
channel, power off or increase/decrease volume are only few examples. An
attacker can also stream channels via port 49152/TCP or a dynamic defined UDP
port which depends on the content of the downloaded 'T*.asx' file.

SEC Consult recommends not to forward any port of this device to the internet
until a thorough security review has been performed by security professionals
and all identified issues have been resolved.

Upgrade to newer hardware is recommended since this product line is
end-of-life and not longer supported by Kathrein.

Vulnerability overview/description:
1) Unauthenticated root access by default
An attacker can login to the device without password as "root". Botnets
are mostly built by such weak default settings.

2) Denial of Service (DoS)
The receiver can be restarted by killing the web-service on the device from
remote. This results in a connection loss between the TV and the receiver

3) Unauthenticated Control of Receiver over the Network
The receiver can be controlled via web-service by GET-requests. An attacker
is able to do the following actions without authentication:
-) Switch the channel
-) Record on a channel
-) Delete records
-) Restart the receiver
-) Watch live-streams by using another UDP-port

Proof of concept:
The vendor stated that the product line is end-of-life, hence there is no fix
available. The proof of concept has been removed from this advisory.

Vulnerable / tested versions:
UFSconnect 916 Firmware 2.23 Build 224

The firmware of UFSconnect 906 (2.22 Build 349) is partially equal and very
similar to the firmware of UFSconnect 916 (2.23 Build 224).

Based on results of the SEC Technologies IoT Inspector
( -
automated firmware analysis tool) we believe that UFSconnect 906
(2.22 Build 349) is also prone to the identified vulnerabilities as well as
UFSconnect 916 (2.23 Build 224).

Since controlling the receiver is possible via the Kathrein UFScontrol app
on different UFS models, we believe that the following products are also prone
to 3) too:
UFS 912, UFS 913, UFS 922, UFS 923, UFS 924, UFS 925, UFS 935, UFS 946

Vendor contact timeline:
2017-03-21: Sending advisory via secure file-upload to the vendor.
2017-06-07: Asked for status update.
2017-06-09: Vendor answered that he will be reachable at 2017-06-12.
2017-06-12: Call with vendor. Product line is end-of-life (EOL), no fix is
planned. Informing vendor that the advisory will be published
without PoC on 2017-07-27.
2017-07-27: Coordinated release of advisory.

Upgrade to newer hardware.

Set a password for the "root" user.
There is no workaround for the vulnerable web service. Restrict network
access of web service. Do not expose this service to the internet.

Advisory URL:


SEC Consult Vulnerability Lab

SEC Consult
Bangkok - Berlin - Linz - Luxembourg - Montreal - Moscow
Kuala Lumpur - Singapore - Vienna (HQ) - Vilnius - Zurich

About SEC Consult Vulnerability Lab
The SEC Consult Vulnerability Lab is an integrated part of SEC Consult. It
ensures the continued knowledge gain of SEC Consult in the field of network
and application security to stay ahead of the attacker. The SEC Consult
Vulnerability Lab supports high-quality penetration testing and the evaluation
of new offensive and defensive technologies for our customers. Hence our
customers obtain the most current information about vulnerabilities and valid
recommendation about the risk profile of new technologies.

Interested to work with the experts of SEC Consult?
Send us your application

Interested in improving your cyber security with the experts of SEC Consult?
Contact our local offices

Mail: research at sec-consult dot com

EOF T. Weber / @2017


RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

August 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    19 Files
  • 2
    Aug 2nd
    17 Files
  • 3
    Aug 3rd
    16 Files
  • 4
    Aug 4th
    1 Files
  • 5
    Aug 5th
    1 Files
  • 6
    Aug 6th
    19 Files
  • 7
    Aug 7th
    15 Files
  • 8
    Aug 8th
    9 Files
  • 9
    Aug 9th
    7 Files
  • 10
    Aug 10th
    10 Files
  • 11
    Aug 11th
    1 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    14 Files
  • 14
    Aug 14th
    18 Files
  • 15
    Aug 15th
    38 Files
  • 16
    Aug 16th
    16 Files
  • 17
    Aug 17th
    22 Files
  • 18
    Aug 18th
    3 Files
  • 19
    Aug 19th
    3 Files
  • 20
    Aug 20th
    21 Files
  • 21
    Aug 21st
    7 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By