CVE-2017-11165

9.8 CRITICAL

📋 TL;DR

CVE-2017-11165 allows remote attackers to retrieve sensitive configuration files including credentials from DataTaker DT80 dEX devices by directly accessing a specific URL. This affects all systems running the vulnerable firmware version that are network-accessible. Attackers can obtain administrative credentials and device configuration without authentication.

💻 Affected Systems

Products:
  • DataTaker DT80 dEX
Versions: 1.50.012
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices with web interface enabled are vulnerable by default. The vulnerable endpoint is accessible without authentication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise leading to data manipulation, industrial process disruption, or use as an attack pivot point within operational technology networks.

🟠

Likely Case

Credential theft enabling unauthorized access to the device, configuration modification, or data exfiltration.

🟢

If Mitigated

Limited to reconnaissance only if proper network segmentation and access controls prevent exploitation.

🌐 Internet-Facing: HIGH - Direct unauthenticated access to sensitive files from internet-connected devices.
🏢 Internal Only: HIGH - Even internally, the vulnerability requires no authentication and exposes critical credentials.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only a web browser or curl command to access the vulnerable URL. Multiple public exploit scripts exist.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Later versions than 1.50.012

Vendor Advisory: https://www.schneider-electric.com/en/download/document/SEVD-2017-173-01/

Restart Required: Yes

Instructions:

1. Contact Schneider Electric/DataTaker support for updated firmware. 2. Backup current configuration. 3. Apply firmware update following vendor instructions. 4. Restart device. 5. Verify fix by attempting to access /services/getFile.cmd?userfile=config.xml

🔧 Temporary Workarounds

Network Access Restriction

linux

Block external access to DT80 web interface using firewall rules

iptables -A INPUT -p tcp --dport 80 -s ! trusted_network -j DROP
iptables -A INPUT -p tcp --dport 443 -s ! trusted_network -j DROP

Web Server Configuration

all

If possible, configure web server to restrict access to /services/getFile.cmd endpoint

🧯 If You Can't Patch

  • Isolate DT80 devices in separate VLAN with strict firewall rules allowing only necessary communications
  • Implement network monitoring for access attempts to /services/getFile.cmd endpoint

🔍 How to Verify

Check if Vulnerable:

Attempt to access http://[device_ip]/services/getFile.cmd?userfile=config.xml. If XML configuration file downloads, device is vulnerable.

Check Version:

Check device web interface or use SNMP to query system version

Verify Fix Applied:

After patching, attempt the same access. Should return error or access denied instead of configuration file.

📡 Detection & Monitoring

Log Indicators:

  • HTTP GET requests to /services/getFile.cmd in web server logs
  • Unauthenticated access attempts from unexpected IP addresses

Network Indicators:

  • HTTP requests to /services/getFile.cmd?userfile=config.xml
  • Traffic patterns showing configuration file downloads

SIEM Query:

source="web_logs" AND uri="/services/getFile.cmd" AND query="userfile=config.xml"

🔗 References

📤 Share & Export