CVE-2023-36669

9.8 CRITICAL

📋 TL;DR

CVE-2023-36669 is a critical authentication bypass vulnerability in Kratos NGC Indoor Units (IDU) that allows remote attackers to impersonate the Touch Panel Unit and gain complete control of the IDU/ODU system. Any attacker with network access to the IDU can exploit this vulnerability by sending crafted TCP requests. Organizations using affected Kratos NGC IDU systems before version 11.4 are vulnerable.

💻 Affected Systems

Products:
  • Kratos NGC Indoor Unit (IDU)
Versions: All versions before 11.4
Operating Systems: Embedded system firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the IDU component of Kratos NGC systems; requires network access to the IDU interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the IDU/ODU system allowing attackers to manipulate HVAC controls, disable environmental monitoring, or potentially cause physical damage to connected equipment.

🟠

Likely Case

Unauthorized control of building HVAC systems leading to operational disruption, environmental safety risks, and potential data exfiltration from connected systems.

🟢

If Mitigated

Limited impact if systems are isolated in secure networks with strict access controls and monitored for anomalous TCP traffic.

🌐 Internet-Facing: HIGH - If IDU systems are exposed to the internet, attackers can remotely exploit without any authentication.
🏢 Internal Only: HIGH - Even internally, any network-connected attacker can exploit this vulnerability without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only network access and ability to craft TCP packets to the IDU service port.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.4 and later

Vendor Advisory: https://www.kratosdefense.com/vulnerability-advisories/cve-2023-36669

Restart Required: Yes

Instructions:

1. Download firmware version 11.4 or later from Kratos support portal. 2. Backup current configuration. 3. Apply firmware update following vendor documentation. 4. Restart IDU unit. 5. Verify version is 11.4 or higher.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate IDU systems in separate VLAN with strict firewall rules limiting access to authorized management systems only.

Access Control Lists

all

Implement network ACLs to restrict TCP access to IDU management interface from only authorized IP addresses.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate IDU systems from general network traffic
  • Deploy network monitoring and intrusion detection for anomalous TCP traffic to IDU ports

🔍 How to Verify

Check if Vulnerable:

Check IDU firmware version via web interface or serial console; versions below 11.4 are vulnerable.

Check Version:

Check via IDU web interface at System > About or via serial console using vendor-specific commands.

Verify Fix Applied:

Verify firmware version shows 11.4 or higher after update and test that unauthorized TCP connections to IDU management port are rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized TCP connections to IDU management port
  • Multiple failed authentication attempts from unexpected sources
  • Configuration changes from unauthorized IP addresses

Network Indicators:

  • TCP traffic to IDU management port (default 502) from unauthorized sources
  • Crafted TCP packets with TPU impersonation patterns
  • Unusual command sequences to IDU systems

SIEM Query:

source_ip NOT IN (authorized_ips) AND destination_port=502 AND protocol=TCP

🔗 References

📤 Share & Export