CVE-2021-3252
📋 TL;DR
CVE-2021-3252 is an authentication bypass vulnerability in KACO New Energy XP100U devices where the local server always returns valid credentials in plain text regardless of input password. This allows attackers to obtain legitimate login credentials and gain unauthorized access to the Human-Machine Interface (HMI). Organizations using KACO XP100U devices with XP-JAVA software up to version 2.0 are affected.
💻 Affected Systems
- KACO New Energy XP100U
📦 What is this software?
Xp100u Firmware by Kaco Newenergy
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain full administrative access to the HMI, potentially allowing them to manipulate industrial control systems, disrupt energy production, or cause physical damage to equipment.
Likely Case
Unauthorized access to the HMI interface leading to information disclosure, configuration changes, or disruption of monitoring capabilities.
If Mitigated
Limited impact if devices are properly segmented and access is restricted to authorized personnel only.
🎯 Exploit Status
Exploitation requires network access to the device's authentication endpoint. Public blog posts demonstrate the vulnerability.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-15-224-01
Restart Required: No
Instructions:
No official patch available. Follow workarounds and mitigation steps.
🔧 Temporary Workarounds
Network Segmentation
allIsolate KACO XP100U devices from untrusted networks and restrict access to authorized IP addresses only.
Access Control Lists
allImplement firewall rules to block unauthorized access to the device's authentication endpoints.
🧯 If You Can't Patch
- Implement strict network segmentation to isolate affected devices from untrusted networks
- Monitor network traffic for unauthorized authentication attempts to the device endpoints
🔍 How to Verify
Check if Vulnerable:
Test authentication endpoint by sending invalid credentials and checking if valid credentials are returned in plain text.
Check Version:
Check device firmware/software version through HMI interface or device documentation.
Verify Fix Applied:
Verify that authentication endpoint no longer returns credentials when invalid passwords are provided.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed authentication attempts followed by successful access
- Authentication requests from unusual IP addresses
Network Indicators:
- HTTP requests to authentication endpoints from unauthorized sources
- Plain text credential transmission in network traffic
SIEM Query:
source_ip IN (unauthorized_ips) AND destination_port=80 AND uri_path CONTAINS 'auth' OR 'login'
🔗 References
- https://tiger-team-1337.blogspot.com/2021/01/kaco-xp100u-hmi-credential-leak.html
- https://twitter.com/Kevin2600/status/1351189347501023238
- https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-15-224-01
- https://tiger-team-1337.blogspot.com/2021/01/kaco-xp100u-hmi-credential-leak.html
- https://twitter.com/Kevin2600/status/1351189347501023238
- https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-15-224-01