CVE-2022-31481

10.0 CRITICAL

📋 TL;DR

An unauthenticated buffer overflow vulnerability in HID Mercury Intelligent Controllers allows attackers to execute arbitrary code by sending specially crafted update files. This affects LP1501, LP1502, LP2500, LP4502, and EP4502 controllers with vulnerable firmware versions. Successful exploitation gives attackers full device control including monitoring communications, modifying relays, changing configurations, or crashing devices.

💻 Affected Systems

Products:
  • HID Mercury Intelligent Controller LP1501
  • HID Mercury Intelligent Controller LP1502
  • HID Mercury Intelligent Controller LP2500
  • HID Mercury Intelligent Controller LP4502
  • HID Mercury Intelligent Controller EP4502
Versions: LP series firmware prior to 1.302, EP series firmware prior to 1.296
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices with vulnerable firmware versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to monitor all communications, modify physical relay states, alter configurations, install persistent backdoors, or cause critical system failures affecting physical security systems.

🟠

Likely Case

Attackers gain remote code execution to monitor device communications, modify configurations, and potentially disrupt physical access control systems.

🟢

If Mitigated

With proper network segmentation and access controls, impact limited to isolated network segments with no critical system access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unauthenticated exploitation via crafted update files makes this easily exploitable once details are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: LP series: 1.302+, EP series: 1.296+

Vendor Advisory: https://www.corporate.carrier.com/product-security/advisories-resources/

Restart Required: Yes

Instructions:

1. Download latest firmware from HID/Carrier support portal. 2. Backup current configuration. 3. Upload firmware update via web interface or management software. 4. Reboot device. 5. Verify firmware version after reboot.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate controllers in dedicated VLAN with strict firewall rules blocking external access to update ports.

Access Control Lists

all

Implement IP-based restrictions allowing only authorized management systems to communicate with controllers.

🧯 If You Can't Patch

  • Segment network to isolate controllers from untrusted networks
  • Implement strict firewall rules blocking all unnecessary inbound traffic to controller management interfaces

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface or management software. LP series versions below 1.302 and EP series versions below 1.296 are vulnerable.

Check Version:

Check via web interface at http://[controller-ip]/ or using Mercury Enterprise Controller software

Verify Fix Applied:

Verify firmware version shows LP series 1.302+ or EP series 1.296+ after update.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected firmware update attempts
  • Multiple failed update attempts from unauthorized sources
  • Device configuration changes without authorized maintenance windows

Network Indicators:

  • Unusual traffic to controller update ports (typically 80/443)
  • Firmware update packets from unexpected source IPs
  • Large file transfers to controller management interfaces

SIEM Query:

source_ip=* AND dest_port IN (80,443) AND dest_ip IN (controller_ips) AND bytes_transferred > 1000000 AND uri_path CONTAINS 'update' OR 'firmware'

🔗 References

📤 Share & Export