CVE-2019-16674

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to predict authentication cookies used by Weidmueller industrial switches, potentially leading to admin password compromise. Attackers can capture network traffic to obtain predictable authentication information and gain administrative access. Organizations using affected Weidmueller IE-SW-VL05M, IE-SW-VL08MT, and IE-SW-PL10M devices are at risk.

💻 Affected Systems

Products:
  • Weidmueller IE-SW-VL05M
  • Weidmueller IE-SW-VL08MT
  • Weidmueller IE-SW-PL10M
Versions: IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, IE-SW-PL10M 3.3.16 Build 16102416
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices with default configurations are vulnerable. The vulnerability exists in the authentication cookie mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full administrative compromise of industrial network switches, allowing attackers to reconfigure network infrastructure, disrupt operations, or pivot to other critical systems.

🟠

Likely Case

Unauthorized administrative access to network switches, enabling network reconnaissance, configuration changes, and potential disruption of industrial operations.

🟢

If Mitigated

Limited impact with proper network segmentation, monitoring, and access controls preventing cookie capture and exploitation.

🌐 Internet-Facing: HIGH if devices are exposed to internet, as attackers can remotely capture predictable authentication cookies.
🏢 Internal Only: MEDIUM as attackers would need internal network access, but predictable cookies make exploitation straightforward once network traffic is captured.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network traffic capture to obtain predictable authentication cookies, but once captured, exploitation is straightforward. No authentication bypass needed if cookies are captured.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Contact Weidmueller for updated firmware versions

Vendor Advisory: https://cert.vde.com/en-us/advisories/vde-2019-018

Restart Required: Yes

Instructions:

1. Contact Weidmueller support for updated firmware. 2. Backup current configuration. 3. Apply firmware update following vendor instructions. 4. Restart device. 5. Verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected switches in dedicated VLANs with strict access controls to prevent unauthorized network traffic capture.

Encrypted Management Traffic

all

Use HTTPS/SSH for management interfaces instead of HTTP to prevent cookie capture in plaintext.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected devices from untrusted networks
  • Deploy network monitoring and IDS/IPS to detect authentication cookie capture attempts

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against affected versions. Monitor network traffic for predictable authentication cookies in HTTP requests.

Check Version:

Check via web interface or CLI: show version or similar vendor-specific command

Verify Fix Applied:

Verify updated firmware version is installed. Test that authentication cookies are no longer predictable and are properly randomized.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful login with predictable patterns
  • Administrative access from unexpected IP addresses

Network Indicators:

  • HTTP traffic containing predictable authentication cookies
  • Network sniffing attempts targeting switch management interfaces

SIEM Query:

source="network_switch" AND (http.cookie CONTAINS "predictable_pattern" OR auth_failure > 3)

🔗 References

📤 Share & Export