OTPulse

Commend WS203VICM

Act Now9.4ICS-CERT ICSA-24-051-01Feb 20, 2024
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

The WS203VICM emergency communication device contains vulnerabilities in command argument validation and access control (CWE-88, CWE-284, CWE-261) that allow an unauthenticated network attacker to read sensitive information or force the device to restart. The device is end-of-life, but Commend has released a new firmware version (WS-CM 2.0) that addresses these issues. Firmware can be installed via the IP Station Config tool after downloading the Terminals Software Package from Commend's web portal.

What this means
What could happen
An attacker with network access could obtain sensitive information from the WS203VICM or cause the device to restart, disrupting emergency communication systems in facilities that rely on this intercom equipment for safety coordination.
Who's at risk
Organizations operating Commend WS203VICM emergency communication and intercom systems, particularly those in water utilities, power plants, hospitals, and other critical infrastructure facilities that depend on reliable emergency communications for operational safety and coordination.
How it could be exploited
An attacker on the network sends a crafted command to the WS203VICM device. Due to improper argument validation (CWE-88) and weak access controls (CWE-284, CWE-261), the device processes the command without authentication, allowing the attacker to read sensitive data or trigger a denial of service by crashing the device.
Prerequisites
  • Network connectivity to the WS203VICM device (typically on port 80 or default web service port)
  • Device must be running firmware version 1.7 or earlier
  • No valid credentials required
Remotely exploitableNo authentication requiredLow complexity attackNo patch available for original product (end-of-life)Affects safety-critical communication systems
Exploitability
Low exploit probability (EPSS 0.5%)
Affected products (1)
ProductAffected VersionsFix Status
WS203VICM: <=1.7≤ 1.7WS-CM 2.0
Remediation & Mitigation
0/4
Do now
0/2
HARDENINGIsolate WS203VICM and similar communication devices from internet-facing networks and business network segments
HARDENINGPlace WS203VICM devices behind firewall with network access controls limiting connections to authorized intercom management systems only
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXDownload and install firmware WS-CM 2.0 via IP Station Config tool from Commend's web portal
Long-term hardening
0/1
HARDENINGIf remote access to WS203VICM is required, route all connections through a VPN with current security patches
↑↓ Navigate · Esc Close
API: /api/v1/advisories/683c95f7-ddf7-42cd-add1-1ba173180fbc