CVE-2019-6558
📋 TL;DR
This vulnerability allows attackers to reset or change passwords without proper authentication in Auto-Maskin marine control systems and Android app. Affected users include operators of RP210E, DCU210E, and Marine Observer Pro software who haven't updated beyond vulnerable versions.
💻 Affected Systems
- Auto-Maskin RP210E
- Auto-Maskin DCU210E
- Marine Observer Pro (Android App)
📦 What is this software?
Dcu 210e Firmware by Auto Maskin
Marine Pro Observer by Auto Maskin
Rp 210e Firmware by Auto Maskin
⚠️ Risk & Real-World Impact
Worst Case
Unauthorized access to marine control systems could lead to manipulation of vessel operations, safety system bypass, or denial of service affecting navigation and critical functions.
Likely Case
Attackers gain unauthorized access to control interfaces, potentially viewing sensitive data or making unauthorized configuration changes.
If Mitigated
With proper network segmentation and access controls, impact limited to isolated systems with no critical function compromise.
🎯 Exploit Status
Weak password recovery mechanism suggests straightforward exploitation without special tools.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 3.7
Vendor Advisory: https://www.us-cert.gov/ics/advisories/icsa-20-051-04
Restart Required: Yes
Instructions:
1. Contact Auto-Maskin for updated firmware/software. 2. Apply updates to RP210E/DCU210E devices. 3. Update Marine Observer Pro app from Google Play Store. 4. Restart affected systems.
🔧 Temporary Workarounds
Network segmentation
allIsolate affected systems from untrusted networks
Access control restrictions
allImplement strict firewall rules and VPN requirements for remote access
🧯 If You Can't Patch
- Implement multi-factor authentication for all access to affected systems
- Monitor authentication logs for unauthorized password reset attempts
🔍 How to Verify
Check if Vulnerable:
Check device firmware version in system settings or contact Auto-Maskin support
Check Version:
Check device display or configuration interface for firmware version
Verify Fix Applied:
Confirm version is above 3.7 and test password recovery functionality requires proper authentication
📡 Detection & Monitoring
Log Indicators:
- Multiple failed login attempts followed by password reset
- Password reset requests from unusual IP addresses
Network Indicators:
- Unusual authentication traffic patterns
- Password reset API calls without preceding failed logins
SIEM Query:
source="marine_control" AND (event_type="password_reset" OR event_type="authentication_failure")