Vulnerability P1IB-LABAN-006: Insufficiently Protected Credentials
By Laban Sköllermark (@LabanSkoller)
This is an attachment to the blog post Wardriving 2024: Using Electricity Meter Readers to Get In.
Vulnerability Metadata
Vulnerability identifier: P1IB-LABAN-006
Summary: Credentials (password for admin interface, PSK for Wi-Fi, MQTT password) retrievable once set.
CWE: CWE-522: Insufficiently Protected Credentials
CVE: None. A CVE was requested from the MITRE CNA-LR without any response.
CVSS: 6.3 / Medium CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:H/SI:H/SA:N
MITRE Submission
The following information was submitted to the MITRE CNA-LR in CVE Request 1610270 for CVE ID Request the 24th of February 2024. No response was given.
Vulnerability type: Other or Unknown
Other vulnerability type: CWE-522: Insufficiently Protected Credentials
Vendor of the product(s): Remne Technologies AB
Product: P1IB - P1 Interface Bridge - https://github.com/remne/p1ib
Version: Found in stable version 9c2ad9a (build date 2023-SEP-22). Not fixed.
Has vendor confirmed or acknowledged the vulnerability? No
Attack type: Remote
Impact: Information Disclosure, Other
Other impact: Access to the wireless network the device is operating on
Suggested description of the vulnerability for use in the CVE: The smart meter reader P1IB by Remne Technologies AB is storing the Pre-Shared Key (PSK) for the Wi-Fi SSID the device is connected to, and if MQTT with authentication is configured, also the MQTT password. Those passwords are retrievable via a “get configuration” request. An attacker who has gained access to the device via the authentication bypass vulnerability can get the key and password in order to join the same Wi-Fi network or attack the MQTT server.
Discoverer(s)/Credits: Laban Sköllermark
Reference(s):
Additional information:
- Coordinated disclosure deadline: 2024-APR-23