CVE-2021-45031

7.7 HIGH

📋 TL;DR

This vulnerability in MEPSAN's USC+ software allows attackers to generate passwords for high-privileged accounts due to a weakness in the login function. It affects USC+ versions before 3.0, potentially enabling unauthorized administrative access to critical systems.

💻 Affected Systems

Products:
  • MEPSAN USC+
Versions: All versions before 3.0
Operating Systems: Unknown - likely Windows-based given USC+ industrial control software
Default Config Vulnerable: ⚠️ Yes
Notes: Affects USC+ systems used in industrial/SCADA environments for fuel management and similar applications.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control, allowing them to manipulate critical systems, exfiltrate sensitive data, or disrupt operations.

🟠

Likely Case

Unauthorized users create administrative accounts to access sensitive functions and data within the USC+ system.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to isolated systems with quick detection of unauthorized access attempts.

🌐 Internet-Facing: HIGH if USC+ is exposed to the internet, as attackers can remotely exploit the vulnerability without authentication.
🏢 Internal Only: MEDIUM if accessible only internally, requiring attacker presence on the network but still posing significant risk.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability description suggests direct exploitation of login function weakness without requiring authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0

Vendor Advisory: https://www.usom.gov.tr/bildirim/tr-22-0269

Restart Required: Yes

Instructions:

1. Contact MEPSAN for USC+ version 3.0 update. 2. Backup current configuration. 3. Apply the update following vendor instructions. 4. Restart the USC+ system. 5. Verify functionality post-update.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to USC+ systems to only authorized management networks

Access Control Hardening

all

Implement strict firewall rules and monitor for unauthorized access attempts

🧯 If You Can't Patch

  • Implement network segmentation to isolate USC+ systems from untrusted networks
  • Enable detailed logging and monitoring for suspicious account creation or login attempts

🔍 How to Verify

Check if Vulnerable:

Check USC+ software version in system settings or about dialog - if version is below 3.0, system is vulnerable.

Check Version:

Check within USC+ application interface or consult system documentation for version verification method.

Verify Fix Applied:

Verify USC+ version shows 3.0 or higher after update and test that unauthorized account creation is no longer possible.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected account creation events
  • Multiple failed login attempts followed by successful administrative login
  • Login attempts from unusual IP addresses

Network Indicators:

  • Unusual network traffic to USC+ login endpoints
  • Traffic patterns suggesting brute force or enumeration attempts

SIEM Query:

source="USC+ logs" AND (event_type="account_creation" OR (login_attempts > 5 AND success=true))

🔗 References

📤 Share & Export