OTPulse

Cassia Networks Access Controller

Monitor6.2ICS-CERT ICSA-21-119-02Apr 29, 2021
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

A path traversal vulnerability (CWE-22) in Cassia Networks Access Controller allows local attackers to read arbitrary files from the server without authentication. Affected versions include all releases prior to 2.0.1. Cassia Networks has released a patch that mitigates the vulnerability. The vulnerability is not remotely exploitable and requires local file system or shell access.

What this means
What could happen
An attacker with local access to the Access Controller could read sensitive files from the server, potentially exposing system configuration, credentials, or operational data.
Who's at risk
Water utilities and electric utilities using Cassia Networks Access Controller for device authentication and access management should be concerned. This affects any facility relying on this device for control system authentication and credential storage.
How it could be exploited
An attacker must have local file system access to the Access Controller device. They could exploit a path traversal vulnerability (CWE-22) to read arbitrary files outside intended directories, accessing configuration files or credentials stored on the server.
Prerequisites
  • Local access to the Access Controller file system or shell
  • Access Controller version prior to 2.0.1
local access required (limits remote exposure)no authentication required for file read once local access gainedlow complexity exploitationaffects sensitive credential and configuration datapath traversal vulnerability (CWE-22)
Exploitability
Low exploit probability (EPSS 0.1%)
Affected products (1)
ProductAffected VersionsFix Status
Access Controller: All< 2.0.12.0.1
Remediation & Mitigation
0/4
Do now
0/2
HARDENINGRestrict local console and SSH access to the Access Controller to authorized personnel only
HARDENINGPlace the Access Controller behind a firewall and isolate it from direct Internet access
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate Cassia Networks Access Controller to version 2.0.1 or later (requires login to Cassia vendor portal for download)
Long-term hardening
0/1
HARDENINGImplement network segmentation to limit physical or remote access to the Access Controller to a trusted management network only
↑↓ Navigate · Esc Close
API: /api/v1/advisories/fc001c2f-a382-4b9f-9432-9d36cdf6a969