CVE-2014-6617
📋 TL;DR
CVE-2014-6617 is a critical vulnerability in Softing FG-100 PB PROFIBUS firmware that contains a hardcoded root password, allowing remote attackers to gain full administrative control via TELNET. This affects all systems running the vulnerable firmware version, primarily industrial control systems using these PROFIBUS gateways. Attackers can completely compromise affected devices without needing to guess or crack passwords.
💻 Affected Systems
- Softing FG-100 PB PROFIBUS Gateway
📦 What is this software?
Fg 100 Pb Profibus Firmware by Industrial.softing
⚠️ Risk & Real-World Impact
Worst Case
Complete system takeover allowing attackers to modify industrial processes, disrupt operations, steal sensitive industrial data, or use the device as a pivot point into other critical systems.
Likely Case
Unauthorized administrative access leading to configuration changes, data exfiltration, and potential disruption of industrial processes.
If Mitigated
Limited impact if TELNET is disabled or network segmentation prevents access to the vulnerable service.
🎯 Exploit Status
Exploitation is trivial - simply connect via TELNET using the hardcoded credentials. Public exploit code and detailed analysis are available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Later firmware versions (specific version not documented in public sources)
Vendor Advisory: Not publicly available in provided references
Restart Required: Yes
Instructions:
1. Contact Softing for updated firmware. 2. Backup current configuration. 3. Apply firmware update following vendor instructions. 4. Verify TELNET service is disabled or secured.
🔧 Temporary Workarounds
Disable TELNET Service
allCompletely disable the TELNET service to prevent remote exploitation
Configuration dependent - use device management interface to disable TELNET
Network Segmentation
allIsolate affected devices in separate network segments with strict access controls
🧯 If You Can't Patch
- Implement strict network access controls to block all TELNET traffic to affected devices
- Monitor for TELNET authentication attempts and investigate any successful logins
🔍 How to Verify
Check if Vulnerable:
Attempt TELNET connection to port 23 and try known hardcoded credentials (specific password not listed for security reasons)
Check Version:
Check via device web interface or serial console - vendor-specific command
Verify Fix Applied:
Verify firmware version is newer than FG-x00-PB_V2.02.0.00 and TELNET connections with hardcoded credentials fail
📡 Detection & Monitoring
Log Indicators:
- Successful TELNET logins from unexpected sources
- Multiple failed TELNET authentication attempts
Network Indicators:
- TELNET connections to port 23 from unauthorized IPs
- Unusual outbound connections from affected devices
SIEM Query:
source_port=23 AND (event_type="authentication_success" OR event_type="login")
🔗 References
- http://packetstormsecurity.com/files/128976/Softing-FG-100-PB-Hardcoded-Backdoor.html
- http://www.securityfocus.com/archive/1/533902/100/0/threaded
- http://www.securityfocus.com/bid/70927
- https://exchange.xforce.ibmcloud.com/vulnerabilities/98512
- https://www.compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2014-005_softring_backdoor_account.txt
- http://packetstormsecurity.com/files/128976/Softing-FG-100-PB-Hardcoded-Backdoor.html
- http://www.securityfocus.com/archive/1/533902/100/0/threaded
- http://www.securityfocus.com/bid/70927
- https://exchange.xforce.ibmcloud.com/vulnerabilities/98512
- https://www.compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2014-005_softring_backdoor_account.txt