CVE-2023-27388
📋 TL;DR
An improper authentication vulnerability in T&D Corporation and ESPEC MIC CORP. data logger products allows remote unauthenticated attackers to log in as registered users. This affects multiple data logger models from both manufacturers across all firmware versions. The vulnerability enables complete authentication bypass without requiring credentials.
💻 Affected Systems
- T&D Corporation TR-71W
- T&D Corporation TR-72W
- T&D Corporation RTR-5W
- T&D Corporation WDR-7
- T&D Corporation WDR-3
- T&D Corporation WS-2
- ESPEC MIC CORP. RT-12N
- ESPEC MIC CORP. RS-12N
- ESPEC MIC CORP. RT-22BN
- ESPEC MIC CORP. TEU-12N
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of data logging systems allowing unauthorized access to sensitive environmental/industrial data, potential data manipulation, and use as pivot points into connected networks.
Likely Case
Unauthorized access to monitoring data, potential data tampering, and exposure of sensitive industrial/environmental information.
If Mitigated
Limited impact if devices are isolated in air-gapped networks with strict network segmentation and access controls.
🎯 Exploit Status
Vulnerability details are public but no proof-of-concept exploit code has been published. The authentication bypass nature makes exploitation straightforward.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: None available
Vendor Advisory: https://www.tandd.com/news/detail.html?id=780
Restart Required: No
Instructions:
No firmware patches available. Contact vendors for potential hardware replacement or mitigation guidance.
🔧 Temporary Workarounds
Network Isolation
allPlace affected devices in isolated network segments with strict firewall rules.
Access Control Lists
allImplement strict IP-based access controls to limit connections to trusted sources only.
🧯 If You Can't Patch
- Segment affected devices in dedicated VLANs with no internet access
- Implement strict firewall rules allowing only necessary traffic from authorized management stations
🔍 How to Verify
Check if Vulnerable:
Check device model against affected products list. Attempt authentication bypass via documented methods if available.
Check Version:
Check device web interface or serial console for firmware version information
Verify Fix Applied:
No fix available to verify. Verify network controls are properly implemented instead.
📡 Detection & Monitoring
Log Indicators:
- Failed login attempts followed by successful logins from same IP
- Authentication logs showing successful logins without credential validation
- Access from unexpected IP addresses
Network Indicators:
- Unauthenticated HTTP/HTTPS requests to login endpoints
- Traffic patterns suggesting authentication bypass
SIEM Query:
source="data_logger" AND (event_type="authentication" AND result="success" AND auth_method="none")
🔗 References
- https://jvn.jp/en/jp/JVN14778242/
- https://www.monitoring.especmic.co.jp/post/VulnerabilityInRT-12N_RS-12N_RT-22BNandTEU-12N
- https://www.tandd.com/news/detail.html?id=780
- https://jvn.jp/en/jp/JVN14778242/
- https://www.monitoring.especmic.co.jp/post/VulnerabilityInRT-12N_RS-12N_RT-22BNandTEU-12N
- https://www.tandd.com/news/detail.html?id=780