Emerson WirelessHART Gateways
Restrict access to ports TCP/33333, TCP/5094, and UDP/5094-5126. Restrict physical access to the Gateway and to instruments. Enable the Remote Logging feature found under System Settings -> Gateway -> Logging. Change passwords on all built-in user accounts to complex passwords. Run the Security Setup Utility to generate client certificates; ensure that the insecure HART-IP and AMS protocols are disabled and instead only enable the AMS Secure, HART-IP Secure, and other ‘Secure’ versions of protocols are enabled. Note, however, that once ‘secure’, these protocols will be encrypted and will make monitoring for malicious instrument changes more difficult.
affected product:
WirelessHART Gateway
Limited Threat
CVE ID
CVE-2021-31528
CVE-2021-31527
CVE-2021-31526
CVE-2021-28490
CVE-2006-3082
CVE-2006-6235
CVE-2007-1263
CVE-2021-31529
ID
CVE-2021-31528
Source
Dragos
Skill Level
N/A
CVSSV3 BASE / TEMPORAL SCORE
N/A
CVSSV3 vector
N/A
Affecting
Vulnerability Type
Memory Manipulation
Manipulation of Control and Denial of Control
Cross-Site Request Forgery (CSRF)
Web Application Permissions Issues
Upgrade and Licensing Arbitrary Code Execution
Upgrade and Licensing Arbitrary Code Execution
Upgrade and Licensing Arbitrary Code Execution
Unauthenticated Attacker May Issue Dangerous Commands to Instruments
Disclosure Timeline
06/28/2021 - Dragos discloses issue