CVE-2021-32003

8.0 HIGH

📋 TL;DR

This vulnerability allows a local attacker to capture credentials transmitted in plaintext by the SiteManager provisioning service after initial device setup. It affects all Secomea SiteManager hardware devices running versions prior to 9.5.

💻 Affected Systems

Products:
  • Secomea SiteManager
Versions: All versions prior to 9.5
Operating Systems: Embedded OS on SiteManager hardware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects hardware devices when provisioning service is used after initial setup.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker obtains administrative credentials, leading to complete device compromise, data exfiltration, and potential lateral movement within the network.

🟠

Likely Case

Local attacker captures credentials used for device management, enabling unauthorized access to the SiteManager device and potentially connected systems.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the local device only, preventing credential reuse elsewhere.

🌐 Internet-Facing: LOW - This requires local network access to the provisioning service.
🏢 Internal Only: HIGH - Any local attacker on the same network segment can potentially intercept credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the provisioning service and ability to capture network traffic.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.5

Vendor Advisory: https://www.secomea.com/support/cybersecurity-advisory

Restart Required: Yes

Instructions:

1. Download SiteManager firmware version 9.5 or later from Secomea support portal. 2. Upload firmware to SiteManager device via web interface. 3. Apply firmware update. 4. Reboot device to complete installation.

🔧 Temporary Workarounds

Disable provisioning service after setup

all

Stop using the provisioning service once initial device configuration is complete

Network segmentation

all

Isolate SiteManager devices on separate VLANs with strict access controls

🧯 If You Can't Patch

  • Segment SiteManager devices on isolated network segments with strict firewall rules
  • Implement network monitoring to detect credential capture attempts on provisioning service ports

🔍 How to Verify

Check if Vulnerable:

Check SiteManager firmware version via web interface or CLI. If version is below 9.5, device is vulnerable.

Check Version:

Check via web interface at System > About, or via SSH: show version

Verify Fix Applied:

Confirm firmware version is 9.5 or higher in device administration interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual network traffic to provisioning service ports
  • Multiple failed authentication attempts after credential capture

Network Indicators:

  • Unencrypted credential transmission on network
  • Unexpected connections to provisioning service from unauthorized hosts

SIEM Query:

source_ip IN (site_manager_ips) AND dest_port IN (provisioning_ports) AND protocol = 'tcp' AND payload_contains('password')

🔗 References

📤 Share & Export