CVE-2023-1142

7.5 HIGH

📋 TL;DR

This vulnerability in Delta Electronics InfraSuite Device Master allows attackers to bypass authentication and retrieve sensitive system files and credentials through URL decoding manipulation. It affects all versions prior to 1.0.5, potentially impacting industrial control systems using this software for device management.

💻 Affected Systems

Products:
  • Delta Electronics InfraSuite Device Master
Versions: All versions prior to 1.0.5
Operating Systems: Windows-based systems running InfraSuite
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web management interface component of InfraSuite Device Master.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining administrative privileges, accessing all device credentials, and potentially disrupting industrial operations.

🟠

Likely Case

Unauthorized access to sensitive configuration files and credentials, leading to privilege escalation and further system exploitation.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation attempts.

🌐 Internet-Facing: HIGH - Directly exploitable via web interface without authentication.
🏢 Internal Only: HIGH - Even internally, this provides easy privilege escalation path.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

URL decoding manipulation is a well-known technique requiring minimal technical skill to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.5

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-02

Restart Required: Yes

Instructions:

1. Download InfraSuite Device Master version 1.0.5 from Delta Electronics. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart the service/application.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate InfraSuite Device Master from untrusted networks and internet access.

Access Control Lists

all

Restrict access to the web interface using firewall rules to only trusted IP addresses.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the vulnerable system
  • Monitor for suspicious URL decoding patterns in web server logs

🔍 How to Verify

Check if Vulnerable:

Check InfraSuite Device Master version in application interface or installation directory. Versions below 1.0.5 are vulnerable.

Check Version:

Check application GUI or installation properties for version information.

Verify Fix Applied:

Confirm version is 1.0.5 or higher in application interface and test authentication bypass attempts fail.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful access
  • URLs containing encoded characters or path traversal patterns
  • Access to sensitive file paths in web logs

Network Indicators:

  • HTTP requests with URL-encoded path traversal sequences
  • Unauthenticated access to administrative endpoints

SIEM Query:

web.url CONTAINS "%2F..%2F" OR web.url CONTAINS "%252E%252E" AND dest_ip = [InfraSuite_IP]

🔗 References

📤 Share & Export