Mesa Labs AmegaView Versions 3.0 uses default cookies that could be set to bypass authentication to the web application, which may allow an attacker to gain access.
Description: CWE-288 Authentication Bypass Using an Alternate Path or Channel
Metrics
Version
Base score
Base severity
Vector
3.1
7.3
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Version:3.1
Base score:7.3
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Metrics Other Info
Impacts
CAPEC ID
Description
Solutions
Configurations
Workarounds
MesaLabs has scheduled AmegaView for end-of-life at the end of 2021. Due to this discontinued service, MesaLabs does not plan to release an update to address these vulnerabilities. MesaLabs recommends users upgrade to the newer ViewPoint software that is compatible with AmegaView hardware.
CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:
Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet.
Locate control system networks and remote devices behind firewalls, and isolate them from the business network.
When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices.
Exploits
Credits
Stephen Yackey of Securifera reported these vulnerabilities to CISA.