CVE-2017-7928

10.0 CRITICAL

📋 TL;DR

This vulnerability in Schweitzer Engineering Laboratories security gateways allows unauthorized communications to downstream devices when configured for NAT port forwarding. It affects SEL-3620 and SEL-3622 Security Gateway devices running vulnerable firmware versions, potentially exposing industrial control systems to external attacks.

💻 Affected Systems

Products:
  • SEL-3620 Security Gateway
  • SEL-3622 Security Gateway
Versions: R202, R203, R203-V1, R203-V2, R204, R204-V1
Operating Systems: Embedded firmware
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when configured for NAT port forwarding. Devices not using NAT port forwarding are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could bypass all network security controls and directly access critical industrial control systems, potentially causing physical damage, operational disruption, or safety incidents.

🟠

Likely Case

Unauthorized access to downstream industrial control devices, allowing attackers to monitor, modify, or disrupt industrial processes.

🟢

If Mitigated

With proper network segmentation and access controls, impact would be limited to isolated network segments.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the vulnerable device and knowledge of NAT port forwarding configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: R204-V2 and later

Vendor Advisory: https://ics-cert.us-cert.gov/advisories/ICSA-17-192-06

Restart Required: Yes

Instructions:

1. Download firmware version R204-V2 or later from SEL website. 2. Backup current configuration. 3. Upload new firmware via web interface or console. 4. Reboot device. 5. Restore configuration if needed.

🔧 Temporary Workarounds

Disable NAT Port Forwarding

all

Remove or disable NAT port forwarding configurations on affected devices

Access device web interface > NAT Configuration > Remove all port forwarding rules

Network Segmentation

all

Isolate affected devices behind additional firewalls with strict access controls

🧯 If You Can't Patch

  • Implement strict network access controls to limit traffic to affected devices
  • Monitor network traffic for unauthorized access attempts to downstream systems

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface: System > About. If version is R202, R203, R203-V1, R203-V2, R204, or R204-V1, device is vulnerable when NAT port forwarding is enabled.

Check Version:

ssh admin@device-ip 'show version' or check web interface System > About page

Verify Fix Applied:

Verify firmware version is R204-V2 or later and confirm NAT port forwarding rules are properly enforced.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized connection attempts to downstream IPs
  • Unexpected NAT table entries
  • Port forwarding rule violations

Network Indicators:

  • Unexpected traffic patterns to downstream devices
  • Port scans targeting forwarded ports
  • Traffic bypassing expected security controls

SIEM Query:

source_ip IN (external_ips) AND dest_ip IN (downstream_ips) AND NOT source_ip IN (authorized_ips)

🔗 References

📤 Share & Export