Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2018-10603 : Security Advisory and Response

Learn about CVE-2018-10603 affecting Martem TELEM GW6 and GWM devices. Unauthorized remote control risk due to missing authentication for IEC-104 control commands.

Devices like Martem TELEM GW6 and GWM, running on firmware version 2018.04.18-linux_4-01-601cb47 and older, have a security vulnerability that allows unauthorized remote control of industrial processes.

Understanding CVE-2018-10603

Martem TELEM GW6 and GWM devices are susceptible to unauthorized remote control due to a lack of authentication for IEC-104 control commands.

What is CVE-2018-10603?

The vulnerability in CVE-2018-10603 stems from the absence of authentication for IEC-104 control commands on Martem TELEM GW6 and GWM devices.

The Impact of CVE-2018-10603

This vulnerability enables unauthorized nodes to potentially take control of industrial processes remotely, posing a significant security risk.

Technical Details of CVE-2018-10603

Martem TELEM GW6 and GWM devices are affected by a critical security flaw that allows unauthorized remote control.

Vulnerability Description

The vulnerability involves the lack of authentication for IEC-104 control commands, enabling rogue nodes to manipulate industrial processes remotely.

Affected Systems and Versions

        Product: TELEM GW6
              Vendor: Martem
              Versions Affected: 2018.04.18-linux_4-01-601cb47 and prior
        Product: TELEM GWM
              Vendor: Martem
              Versions Affected: 2018.04.18-linux_4-01-601cb47 and prior

Exploitation Mechanism

Unauthorized entities can exploit the vulnerability by sending unauthenticated IEC-104 control commands to the affected devices, potentially gaining remote control access.

Mitigation and Prevention

Immediate action and long-term security practices are crucial to mitigate the risks associated with CVE-2018-10603.

Immediate Steps to Take

        Implement network segmentation to restrict access to vulnerable devices
        Apply firewall rules to filter and monitor incoming and outgoing traffic
        Regularly monitor device logs for any suspicious activities

Long-Term Security Practices

        Conduct regular security assessments and penetration testing
        Keep firmware and software up to date to patch known vulnerabilities
        Educate users and administrators about secure configuration practices

Patching and Updates

        Apply patches provided by Martem to address the authentication vulnerability in the affected devices

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now