LAVA Computer MFG Inc. Ether-Serial Link
Plan Patch8.1ICS-CERT ICSA-17-283-01Oct 10, 2017
Attack VectorNetwork
Auth RequiredNone
ComplexityHigh
User InteractionNone needed
Summary
LAVA Ether-Serial Link firmware versions 6.01.00 and earlier contain an authentication bypass vulnerability (CWE-290). An attacker on the network can send specially crafted packets to the device without providing valid credentials, gaining administrative access to configure or manipulate serial communication settings. LAVA Computer MFG Inc. has not engaged with CISA/ICS-CERT to develop a patch for this vulnerability. All ESL devices running the affected firmware have no available fix from the vendor.
What this means
What could happen
An attacker with network access could bypass authentication and gain remote administrative access to the Ether-Serial Link, allowing them to send arbitrary commands or alter device settings that control serial communication to critical equipment.
Who's at risk
Water utilities and electric utilities using LAVA Ether-Serial Link devices to bridge serial-based equipment (such as older PLCs, RTUs, or metering devices) to Ethernet networks. Any plant with legacy serial instruments, sensors, or actuators connected through ESL devices is at risk.
How it could be exploited
An attacker on the network can send specially crafted packets to the Ether-Serial Link without providing valid credentials. By exploiting insufficient authentication checks (CWE-290), the attacker gains administrative-level access to configure or manipulate the device's serial communication settings.
Prerequisites
- Network access to the Ether-Serial Link on its listening port
- No valid credentials required
remotely exploitableno authentication requiredlow complexity to exploitno patch availableaffects serial communication to control equipment
Exploitability
Moderate exploit probability (EPSS 1.5%)
Affected products (1)
ProductAffected VersionsFix Status
All ESLs running firmware:≤ 6.01.00/29.03.2007No fix yet
Remediation & Mitigation
0/4
Do now
0/2HARDENINGIsolate Ether-Serial Link devices on a dedicated network segment or VLAN with strict access controls; restrict network access to only authorized engineering workstations and control systems
WORKAROUNDImplement firewall rules to limit inbound connections to the Ether-Serial Link; allow only necessary source IPs and ports from known control systems
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HARDENINGMonitor network traffic to and from Ether-Serial Link devices for unauthorized access attempts or suspicious command activity
Long-term hardening
0/1HARDENINGEvaluate replacement of end-of-life Ether-Serial Link units with newer devices from alternative vendors that have active security support
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/8be6d5da-970a-4ad2-bacb-aad38abfa298