CVE-2020-25010

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Kyland KPS2204 6 Port Managed Din-Rail Programmable Serial Device Servers by uploading malicious scripts via specially crafted POST requests. It affects organizations using these industrial serial device servers with vulnerable software versions. Attackers can gain complete control over affected devices.

💻 Affected Systems

Products:
  • Kyland KPS2204 6 Port Managed Din-Rail Programmable Serial Device Server
Versions: Software Version R0002.P05
Operating Systems: Embedded system
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web management interface of the device. No authentication bypass required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of industrial control systems, allowing attackers to disrupt operations, steal sensitive industrial data, or use devices as footholds into broader networks.

🟠

Likely Case

Remote code execution leading to device takeover, data exfiltration, or use in botnets for DDoS attacks.

🟢

If Mitigated

Limited impact if devices are isolated in air-gapped networks with strict access controls and monitoring.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires constructing specific POST requests to upload malicious files. Public proof-of-concept exists in GitHub repositories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Contact Kyland for updated firmware. Consider replacing with supported devices if no fix is provided.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices in separate VLANs with strict firewall rules blocking unnecessary inbound traffic.

Access Control Lists

all

Implement IP-based restrictions to only allow management access from trusted administrative networks.

🧯 If You Can't Patch

  • Remove devices from internet-facing networks immediately
  • Implement strict network monitoring and anomaly detection for unusual POST requests to device management interfaces

🔍 How to Verify

Check if Vulnerable:

Check device web interface for software version R0002.P05. Attempt to access device via web interface and verify version.

Check Version:

Access device web interface at http://[device-ip]/ and check System Information or About page for software version.

Verify Fix Applied:

Verify device firmware has been updated to a version newer than R0002.P05. Test if malicious file upload via POST requests is still possible.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to device management interface
  • File upload attempts to unexpected paths
  • Multiple failed authentication attempts followed by successful POST requests

Network Indicators:

  • POST requests to device IP on port 80/443 with file upload parameters
  • Unusual outbound connections from industrial devices

SIEM Query:

source_ip="industrial_device_ip" AND (http_method="POST" AND uri CONTAINS "upload" OR uri CONTAINS "file")

🔗 References

📤 Share & Export