CVE-2025-52543

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to authenticate to E3 Site Supervisor Control systems by obtaining only password hashes, bypassing the need for actual passwords. It affects systems running firmware versions below 2.31F01 that use client-side hashing for authentication. Organizations using these systems for building management or industrial control are at risk.

💻 Affected Systems

Products:
  • E3 Site Supervisor Control
Versions: All firmware versions < 2.31F01
Operating Systems: Embedded/Proprietary
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both MGW (Management Gateway) and RCI (Remote Control Interface) services that use client-side hashing for authentication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to take control of building management systems, manipulate environmental controls, disable security systems, or access sensitive operational data.

🟠

Likely Case

Unauthorized access to building management systems allowing attackers to monitor operations, disrupt environmental controls, or use the system as a foothold for further network attacks.

🟢

If Mitigated

Limited impact if systems are isolated on segmented networks with strict access controls and monitoring, though authentication bypass remains possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires obtaining password hashes through other means (credential dumping, network sniffing, etc.), but once obtained, authentication bypass is trivial.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.31F01 or later

Vendor Advisory: https://www.armis.com/research/frostbyte10/

Restart Required: Yes

Instructions:

1. Download firmware version 2.31F01 or later from vendor. 2. Backup current configuration. 3. Apply firmware update following vendor instructions. 4. Restart system. 5. Verify authentication now requires actual passwords, not just hashes.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate E3 Site Supervisor systems on separate VLANs with strict firewall rules limiting access to authorized management stations only.

Credential Protection

all

Implement strict password policies and monitor for credential dumping attempts on systems that might store or transmit password hashes.

🧯 If You Can't Patch

  • Implement network-level authentication (802.1X) and strict access controls to limit which systems can communicate with the vulnerable services.
  • Deploy network monitoring and IDS/IPS systems to detect and block authentication attempts using stolen hashes.

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface or CLI. If version is below 2.31F01, system is vulnerable.

Check Version:

Check via web interface at System > About, or consult vendor documentation for CLI command.

Verify Fix Applied:

After patching, verify firmware version is 2.31F01 or later and test authentication requires actual passwords, not just hashes.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful authentication with same credentials
  • Multiple authentication attempts from unusual IP addresses
  • Authentication logs showing hash-based login patterns

Network Indicators:

  • Unusual authentication traffic to MGW/RCI services
  • Credential dumping tools communicating with management systems
  • Authentication bypass attempts

SIEM Query:

source="e3_logs" AND (event_type="authentication" AND result="success") | stats count by src_ip, user | where count > threshold

🔗 References

📤 Share & Export