CVE-2021-27438

8.8 HIGH

📋 TL;DR

CVE-2021-27438 is a hard-coded password vulnerability in Reason DR60 devices that allows attackers to bypass authentication mechanisms. This affects all Reason DR60 firmware versions prior to 02A04.1, potentially compromising industrial control systems.

💻 Affected Systems

Products:
  • Reason DR60
Versions: All firmware versions prior to 02A04.1
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: This is a firmware-level vulnerability affecting the device's authentication mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover leading to industrial process manipulation, data exfiltration, or disruption of critical infrastructure operations.

🟠

Likely Case

Unauthorized access to device configuration, potential lateral movement within industrial networks, and data leakage.

🟢

If Mitigated

Limited impact if devices are isolated behind firewalls with strict network segmentation and access controls.

🌐 Internet-Facing: HIGH - Internet-exposed devices can be directly compromised using the known hard-coded credentials.
🏢 Internal Only: MEDIUM - Internal attackers or malware could exploit this for lateral movement within industrial networks.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only knowledge of the hard-coded password, which is publicly documented in advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 02A04.1

Vendor Advisory: https://us-cert.cisa.gov/ics/advisories/icsa-21-082-03

Restart Required: Yes

Instructions:

1. Download firmware version 02A04.1 from vendor portal. 2. Backup current configuration. 3. Upload and install new firmware via web interface. 4. Verify successful update and restore configuration if needed.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Reason DR60 devices in dedicated VLANs with strict firewall rules limiting inbound/outbound communication.

Access Control Lists

all

Implement IP-based access restrictions to only allow connections from authorized management stations.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable devices from untrusted networks
  • Monitor authentication logs for unauthorized access attempts and implement alerting

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface or SSH: version should be displayed in device information page.

Check Version:

ssh admin@device_ip 'show version' or check web interface System Information page

Verify Fix Applied:

Verify firmware version is 02A04.1 or later in device settings and test authentication with old credentials fails.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful login
  • Multiple login attempts from unusual IP addresses
  • Configuration changes from unauthorized users

Network Indicators:

  • Unusual outbound connections from DR60 devices
  • Traffic patterns inconsistent with normal industrial protocols

SIEM Query:

source="DR60" AND (event_type="authentication" AND result="success") | stats count by src_ip

🔗 References

📤 Share & Export