SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Encryption/VPN)  >   Schneider Electric Trio Radios Vendors:   Schneider Electric
Schneider Electric Trio J-Series Radios Hard Coded Key Lets Remote Users Decrypt Communications
SecurityTracker Alert ID:  1028949
SecurityTracker URL:  http://securitytracker.com/id/1028949
CVE Reference:   CVE-2013-2782   (Links to External Site)
Date:  Aug 23 2013
Impact:   Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): J-Series, firmware 3.6.0, 3.6.1, 3.6.2, and 3.6.3
Description:   A vulnerability was reported in Schneider Electric Trio Radios. A remote user can decrypt communications.

The system uses a hard-coded encryption key. A remote user can use the key to decrypt radio communications.

Systems with AES encryption enabled with a user-defined pass phrase are affected.

The following models are affected:

TBURJR900-00002DH0
TBURJR900-01002DH0
TBURJR900-05002DH0
TBURJR900-06002DH0
TBURJR900-00002EH0
TBURJR900-01002EH0
TBURJR900-05002EH0
TBURJR900-06002EH0

The original advisory is available at:

http://ics-cert.us-cert.gov/advisories/ICSA-13-234-01

Impact:   A remote user can decrypt communications.
Solution:   The vendor has issued a fix.

The vendor's advisory is available at:

http://download.schneider-electric.com/files?p_File_Id=141141292&p_File_Nam+e=SEVD-2013-143-01.pdf

Vendor URL:  download.schneider-electric.com/files?p_File_Id=141141292&p_File_Nam+e=SEVD-2013-143-01.pdf (Links to External Site)
Cause:   Access control error, Configuration error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC