Skip to main content
Security Advisory

Emerson WirelessHART Gateways

Restrict access to ports TCP/33333, TCP/5094, and UDP/5094-5126. Restrict physical access to the Gateway and to instruments. Enable the Remote Logging feature found under System Settings -> Gateway -> Logging. Change passwords on all built-in user accounts to complex passwords. Run the Security Setup Utility to generate client certificates; ensure that the insecure HART-IP and AMS protocols are disabled and instead only enable the AMS Secure, HART-IP Secure, and other ‘Secure’ versions of protocols are enabled. Note, however, that once ‘secure’, these protocols will be encrypted and will make monitoring for malicious instrument changes more difficult.

Risk Information

affected product:

WirelessHART Gateway

Limited Threat

CVE ID

CVE-2021-31528

CVE-2021-31527

CVE-2021-31526

CVE-2021-28490

CVE-2006-3082

CVE-2006-6235

CVE-2007-1263

CVE-2021-31529

ID

CVE-2021-31528

Source

Dragos

Skill Level

N/A

CVSSV3 BASE / TEMPORAL SCORE

N/A

CVSSV3 vector

N/A

Affecting

  • WirelessHART Gateway
  • Vulnerability Type

    Memory Manipulation

    Manipulation of Control and Denial of Control

    Cross-Site Request Forgery (CSRF)

    Web Application Permissions Issues

    Upgrade and Licensing Arbitrary Code Execution

    Upgrade and Licensing Arbitrary Code Execution

    Upgrade and Licensing Arbitrary Code Execution

    Unauthenticated Attacker May Issue Dangerous Commands to Instruments

    Disclosure Timeline

    06/28/2021 - Dragos discloses issue