CVE-2018-15484

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute arbitrary code on KONE Group Controller (KGC) devices by modifying the autoexec.bat file through the open HTTP interface. It affects KGC devices running versions before 4.6.5, potentially compromising building management systems. Attackers can gain full control of affected devices remotely without credentials.

💻 Affected Systems

Products:
  • KONE Group Controller (KGC)
Versions: All versions before 4.6.5
Operating Systems: Embedded/Proprietary OS on KGC devices
Default Config Vulnerable: ⚠️ Yes
Notes: Devices with HTTP interface exposed are vulnerable. The vulnerability is in the web interface component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of building management systems, allowing attackers to disable elevators/escalators, manipulate access controls, or pivot to other building systems, potentially causing physical safety hazards and operational disruption.

🟠

Likely Case

Attackers install malware, create backdoors, or use devices for cryptocurrency mining or botnet participation, leading to system instability and potential data exfiltration.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, potentially only affecting isolated systems with minimal business disruption.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details and proof-of-concept code are publicly available. Attack requires network access to the HTTP interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.6.5 and later

Vendor Advisory: https://www.kone.com/en/vulnerability.aspx

Restart Required: Yes

Instructions:

1. Contact KONE support for upgrade package. 2. Backup current configuration. 3. Apply firmware update to version 4.6.5 or later. 4. Verify update completed successfully. 5. Test system functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate KGC devices from untrusted networks and restrict HTTP interface access

Access Control Lists

all

Implement firewall rules to restrict HTTP access to authorized IP addresses only

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate KGC devices from internet and untrusted networks
  • Deploy intrusion detection systems to monitor for exploitation attempts and unauthorized access

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or management console. If version is below 4.6.5, device is vulnerable.

Check Version:

Check via web interface at http://[device-ip]/status or consult device documentation

Verify Fix Applied:

Verify firmware version is 4.6.5 or higher. Test that autoexec.bat cannot be modified via HTTP interface without authentication.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated HTTP requests to autoexec.bat or configuration files
  • Unusual process execution or system modifications
  • Failed authentication attempts followed by configuration changes

Network Indicators:

  • HTTP POST/PUT requests to autoexec.bat from unauthorized sources
  • Unusual outbound connections from KGC devices
  • Traffic patterns indicating command and control communication

SIEM Query:

source_ip=* AND (url="*autoexec.bat*" OR url="*config*" OR url="*system*" ) AND http_method=POST

🔗 References

📤 Share & Export