OTPulse

Innominate mGuard VPN Vulnerability

Low RiskICS-CERT ICSA-15-239-03May 30, 2015
Summary

Innominate mGuard VPN firmware versions 8.0.0 through 8.1.5 contain an improper permissions vulnerability (CWE-272) that could allow an attacker with network access to gain unauthorized access or escalate privileges on the VPN gateway. The vendor has indicated no fix is planned for this product line.

What this means
What could happen
An attacker with network access could exploit an improper permissions issue in the mGuard VPN gateway to gain unauthorized access or escalate privileges, potentially allowing them to intercept VPN traffic or access protected plant networks.
Who's at risk
Water utilities and electric utilities that use Innominate mGuard VPN gateways to provide secure remote access for field technicians, SCADA engineers, or external vendors to OT networks should be concerned about this vulnerability. The issue affects anyone relying on this device for secure VPN access control.
How it could be exploited
An attacker on the network connected to the mGuard VPN gateway could exploit the improper permissions vulnerability to gain elevated access without proper authentication, then use that access to view or modify VPN configurations or intercept tunneled traffic between remote users and the protected OT network.
Prerequisites
  • Network access to the mGuard VPN gateway
  • Device running vulnerable firmware version 8.0.0 through 8.1.5
No patch availableAffects VPN access controlImproper permissions handling
Exploitability
Low exploit probability (EPSS 0.3%)
Affected products (1)
ProductAffected VersionsFix Status
Innominate mGuard firmware: >=8.0.0|<8.1.6≥ 8.0.0|<8.1.6No fix (EOL)
Remediation & Mitigation
0/3
Do now
0/1
WORKAROUNDImplement network segmentation and firewall rules to restrict direct access to the mGuard VPN gateway to only authorized administrative networks
Mitigations - no patch available
0/2
Innominate mGuard firmware: >=8.0.0|<8.1.6 has reached End of Life. The vendor will not release a patch. Apply the following compensating controls:
HARDENINGMonitor VPN gateway logs for unauthorized access attempts or privilege escalation activity
HARDENINGEvaluate migration to an alternative VPN solution or newer Innominate product if available
↑↓ Navigate · Esc Close
API: /api/v1/advisories/72443180-aaeb-4982-ac4a-4e8aba54ae6d