The Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1 Modular Controller with CoDeSys and SoftMotion do not require authentication for connections to certain TCP ports, which allows remote attackers to (1) modify the configuration via a request to the debug service on port 4000 or (2) delete log entries via a request to the log service on port 4001.
Festo has decided not to resolve these vulnerabilities, placing
critical infrastructure asset owners using this product at risk. This
advisory is being published to alert critical infrastructure asset
owners of the risk of using this equipment, and to increase compensating
security measures if possible. Some of these compensating measures can be:
* Minimize network exposure for all control system devices and/or
systems, and ensure that they are not accessible from the Internet.
* Locate control system networks and remote devices behind firewalls, and isolate them from the business network.
* When remote access is required, use secure methods, such as Virtual
Private Networks (VPNs), recognizing that VPNs may have vulnerabilities
and should be updated to the most current version available. Also
recognize that VPN is only as secure as the connected devices.
* Investigate the practicality of configuring and deploying an
intrusion detection system (IDS) to log and monitor the control system
network, as well as adjacent networks.
* Configure, activate, and test existing defenses, such as port
security and traffic logging, among other defensive strategies in the
recommended practices document listed below.
Exploits
Credits
finder
K. Reid Wightman of IOActive, Inc. has identified vulnerabilities in Festo’s CECX-X-C1 and CECX-X-M1 controllers.