Kunbus PR100088 Modbus Gateway (Update B)
Act Now10ICS-CERT ICSA-19-036-05Feb 5, 2019
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary
The Kunbus PR100088 Modbus gateway contains multiple input validation and authentication bypass vulnerabilities (CWE-287, CWE-306, CWE-20, CWE-598, CWE-312) that allow remote code execution and denial-of-service. An attacker can send crafted Modbus TCP packets to the gateway without credentials or special setup to achieve these impacts. The gateway is typically deployed in industrial networks to bridge supervisory systems to field equipment over Modbus TCP. Kunbus states these devices are designed for protected industrial networks, not Internet-facing deployment. A patch is available for Version R03 or later.
What this means
What could happen
An attacker with network access to the gateway could run arbitrary commands on the device or crash it, disrupting Modbus communication between your industrial network and connected equipment. This could stop real-time control of pumps, motors, valves, or other field devices.
Who's at risk
Water utilities, municipalities, and industrial plants that use the Kunbus PR100088 Modbus gateway to link supervisory control systems or HMIs to field devices (pumps, motors, valves, PLCs) over Modbus TCP. This gateway is often deployed at the edge of industrial networks and directly controls real-time operations.
How it could be exploited
An attacker on the network sends a malformed Modbus TCP request to the gateway's exposed port 502. The gateway fails to validate input or enforce authentication, allowing the attacker to inject code or send commands that crash the service. No valid credentials or special configuration is required.
Prerequisites
- Network access to the PR100088 gateway (typically port 502 for Modbus TCP)
- Device is reachable from an untrusted network segment or the Internet
remotely exploitableno authentication requiredlow complexity attackaffects real-time control of industrial devicesno patch available for older hardware versions (only firmware update available)
Exploitability
Low exploit probability (EPSS 0.3%)
Affected products (1)
ProductAffected VersionsFix Status
PR100088 Modbus gateway: All< R02 (or Software Version 1.1.13166)R03
Remediation & Mitigation
0/5
Do now
0/2HARDENINGIsolate the PR100088 gateway behind a firewall; restrict inbound access to port 502 from authorized industrial network segments only
HARDENINGVerify the device is not reachable from the Internet or any untrusted network
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXUpdate PR100088 Modbus gateway to firmware Version R03 or later
Long-term hardening
0/2HARDENINGSegment the industrial network containing this gateway from the business network
HARDENINGIf remote access to the gateway is required, use a VPN with strong authentication and keep VPN software fully patched
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/45c88224-51a7-4ba7-993f-f7719d098183