CVE-2017-6047

9.8 CRITICAL

📋 TL;DR

CVE-2017-6047 exposes plaintext passwords in an unauthenticated file on Detcon Sitewatch Gateway devices. This allows attackers to obtain administrative credentials and fully compromise the industrial control system gateway. All versions without cellular connectivity are affected.

💻 Affected Systems

Products:
  • Detcon Sitewatch Gateway
Versions: All versions without cellular connectivity
Operating Systems: Embedded/Proprietary
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects non-cellular versions. Cellular versions are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover allowing attackers to manipulate industrial processes, disable safety systems, or exfiltrate sensitive industrial data.

🟠

Likely Case

Unauthorized access to the gateway leading to configuration changes, monitoring disruption, or credential harvesting for lateral movement.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent attackers from reaching the vulnerable file.

🌐 Internet-Facing: HIGH - If exposed to internet, attackers can easily retrieve credentials without authentication.
🏢 Internal Only: HIGH - Even internally, any network-accessible attacker can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP access to retrieve the password file. No authentication or special tools needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Contact Detcon for updated firmware

Vendor Advisory: https://ics-cert.us-cert.gov/advisories/ICSA-17-136-01

Restart Required: Yes

Instructions:

1. Contact Detcon for updated firmware. 2. Backup current configuration. 3. Apply firmware update following vendor instructions. 4. Verify passwords are no longer stored in plaintext.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Sitewatch Gateway from untrusted networks and restrict access to authorized IPs only.

Access Control Lists

all

Implement firewall rules to block all external access to the gateway's web interface.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the gateway from all untrusted networks
  • Change all passwords immediately and monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check if accessible file contains plaintext passwords. Access the gateway's web interface and look for password files.

Check Version:

Check firmware version through web interface or contact Detcon support

Verify Fix Applied:

Verify that password files are no longer accessible or contain encrypted/hashed passwords only.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to password files
  • Multiple failed login attempts followed by successful login

Network Indicators:

  • HTTP requests to known password file locations
  • Unusual traffic patterns to/from the gateway

SIEM Query:

source_ip="gateway_ip" AND (url_contains="password" OR url_contains="cred")

🔗 References

📤 Share & Export