Martem TELEM-GW6/GWM (Update B)
Martem TELEM-GW6 and GWM devices contain multiple critical vulnerabilities allowing unauthorized industrial process control command execution (CVE-2018-10603, CVE-2018-10607), full RTU compromise via weak SSH authentication (CVE-2018-10605), denial of service (CVE-2018-10400), and client-side code execution through the web interface (CVE-2018-10609). The devices allow unauthenticated access to communication channels and TCP/IP command execution, and the web interface lacks proper access controls. Default SSH credentials and disabled firewall features increase exposure risk. No firmware patch is currently available for most vulnerabilities; remediation relies on configuration hardening and compensating controls.
- Network access to the RTU on TCP/IP ports used by communication channels
- For SSH exploit: either default credentials or weak passwords (CVE-2018-10605)
- For web interface exploit: access to port running WebServer, no authentication required (CVE-2018-10607)
- For unauthorized process commands: access to the communication channel protocol used by the RTU
Patching may require device reboot — plan for process interruption
/api/v1/advisories/4af5ad44-a142-401e-a9d6-5590e14e8452