Urgent CISA Alert: Critical Vulnerabilities in Advantech ADAM-5630

  • Thread Author
In a significant alert issued by the Cybersecurity and Infrastructure Security Agency (CISA), urgent warnings have been made regarding the Advantech ADAM-5630 device. As recent investigations reveal, multiple critical vulnerabilities are present that could allow attackers to hijack user sessions, exploit sensitive information, and execute malicious commands—all due to insufficient security measures. If you're using the ADAM-5630, now is the time to pay attention!

1. Executive Summary​

The vulnerabilities in question have been assigned high severity ratings, garnering a CVSS v4 score of 8.5. Here’s a quick overview of the key points you need to know:
  • Vendor: Advantech
  • Affected Equipment: ADAM-5630
  • Vulnerabilities:
    • Use of Persistent Cookies Containing Sensitive Information
    • Cross-Site Request Forgery (CSRF)
    • Weak Password Encoding
    • Missing Authentication for Critical Functions

2. Risk Evaluation​

Exploitation of these vulnerabilities poses profound risks. Attackers could potentially:
  • Hijack sessions: Gain unauthorized access to legitimate user accounts.
  • Engage in CSRF attacks: Induce users to make unintended requests, compromising their security.
  • Cause Denial-of-Service (DoS) conditions: Disrupt service continuity completely.

3. Technical Details​

3.1 Affected Products​

The vulnerabilities affect all versions of the ADAM-5630 prior to version 2.5.2. Users should take immediate action if operating on these older firmware versions.

3.2 Vulnerability Overview​

Here are the specific vulnerabilities identified:
  • Use of Persistent Cookies (CWE-539)
    • Details: Cookies remain active post-session closure, allowing unauthorized access via forged requests.
    • CVE Identifier: [CVE-2024-39275]
    • Severity: CVSS v4 score of 8.5.
    []Cross-Site Request Forgery (CSRF) (CWE-352)
    • Details: Enables attackers to exploit user actions without their consent.
    • CVE Identifier: [CVE-2024-28948]
    • Severity: CVSS v4 score of 8.5.
    [
    ]Weak Password Encoding (CWE-261)
    • Details: User credentials are transmitted in plain text.
    • CVE Identifier: [CVE-2024-34542]
    • Severity: CVSS v4 score of 6.9.
  • Missing Authentication for Critical Function (CWE-306)
    • Details: Commands can be executed without user authentication, allowing unauthorized operations on the device.
    • CVE Identifier: [CVE-2024-39364]
    • Severity: CVSS v4 score of 8.3.

3.3 Background​

  • Critical Infrastructure Sectors Affected: Energy, Water, and Wastewater Systems.
  • Deployment: Devices are utilized globally, making the scale of potential impacts significant.
  • Company Headquarters: Taiwan-based Advantech.

3.4 Researcher Contributions​

These vulnerabilities were reported to CISA by researchers Aarón Flecha Menéndez and Luis Villalba Pérez from S21sec.

4. Mitigations​

Advantech recommends upgrading the ADAM-5630 to the latest firmware version 2.5.2. Further, CISA suggests several proactive measures:
  1. Limit Network Exposure: Ensure control systems are not accessible from the broader Internet.
  2. Firewalls and Isolation: Set up proper firewalls to segregate control networks from business infrastructures.
  3. Utilize VPNs: When remote access is necessary, employ secure methodologies like Virtual Private Networks (VPNs) to shield sensitive operations.
More comprehensive defenses and best practices are available on the CISA website. Organizations are urged to stay informed and adopt recommended strategies for cybersecurity.

5. Update History​

  • Initial Publication Date: September 26, 2024.

Conclusion​

The Advantech ADAM-5630 vulnerabilities underscore the increasing threat landscape facing industrial control systems. It is imperative for organizations reliant on such devices to adopt robust security practices, stay updated with firmware releases, and ensure all communications are secure. Remember, in the world of cybersecurity, proactive measures often draw the line between efficient operation and catastrophic failure.
Stay safe, stay updated, and let’s keep the cyber nightmares at bay!
Source: CISA Advantech ADAM-5630
 


Back
Top