CVE-2017-5139

9.8 CRITICAL

📋 TL;DR

This vulnerability in Honeywell XL Web II controllers allows any user to retrieve passwords by accessing a specific URL due to plaintext password storage. Affected systems include Honeywell XL1000C500 and XLWeb 500 controllers with vulnerable firmware versions, potentially exposing critical building automation systems.

💻 Affected Systems

Products:
  • Honeywell XL1000C500
  • Honeywell XLWeb 500
Versions: XL1000C500: XLWebExe-2-01-00 and prior; XLWeb 500: XLWebExe-1-02-08 and prior
Operating Systems: Embedded controller OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both XL1000C500 and XLWeb 500 controller lines with vulnerable firmware versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to building automation systems, enabling manipulation of HVAC, lighting, or physical security controls, potentially causing physical damage or safety hazards.

🟠

Likely Case

Unauthorized users access sensitive passwords, compromising system integrity and enabling further attacks on building management infrastructure.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to isolated network segments with no critical system exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only accessing a specific URL, making it trivial for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: XL1000C500: XLWebExe-2-02-00; XLWeb 500: XLWebExe-1-03-00

Vendor Advisory: https://ics-cert.us-cert.gov/advisories/ICSA-17-033-01

Restart Required: Yes

Instructions:

1. Download updated firmware from Honeywell support portal. 2. Backup current configuration. 3. Apply firmware update via web interface or local console. 4. Restart controller. 5. Verify new firmware version.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate controllers from untrusted networks and restrict access to authorized IPs only.

Access Control Lists

all

Implement firewall rules to block unauthorized access to controller web interfaces.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate controllers from all untrusted networks
  • Deploy web application firewall rules to block access to vulnerable URL patterns

🔍 How to Verify

Check if Vulnerable:

Access controller web interface and attempt to retrieve password via known vulnerable URL patterns (specific URLs not disclosed for security).

Check Version:

Access controller web interface > System Information > Firmware Version

Verify Fix Applied:

Check firmware version in web interface matches patched versions: XL1000C500: XLWebExe-2-02-00 or later; XLWeb 500: XLWebExe-1-03-00 or later.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access to password-related URLs in web server logs
  • Multiple failed authentication attempts followed by successful access

Network Indicators:

  • HTTP requests to controller URLs from unauthorized IP addresses
  • Unusual traffic patterns to controller web interface

SIEM Query:

source="controller_web_logs" AND (url="*password*" OR url="*credential*")

🔗 References

📤 Share & Export