CVE-2017-7905

A Weak Cryptography for Passwords issue was discovered in General Electric (GE) Multilin SR 750 Feeder Protection Relay, firmware versions prior to Version 7.47; SR 760 Feeder Protection Relay, firmware versions prior to Version 7.47; SR 469 Motor Protection Relay, firmware versions prior to Version 5.23; SR 489 Generator Protection Relay, firmware versions prior to Version 4.06; SR 745 Transformer Protection Relay, firmware versions prior to Version 5.23; SR 369 Motor Protection Relay, all firmware versions; Multilin Universal Relay, firmware Version 6.0 and prior versions; and Multilin URplus (D90, C90, B95), all versions. Ciphertext versions of user passwords were created with a non-random initialization vector leaving them susceptible to dictionary attacks. Ciphertext of user passwords can be obtained from the front LCD panel of affected products and through issued Modbus commands.
References
Link Resource
https://ics-cert.us-cert.gov/advisories/ICSA-17-117-01A Patch Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/98063 Third Party Advisory VDB Entry
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:ge:multilin_sr_750_feeder_protection_relay_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ge:multilin_sr_750_feeder_protection_relay:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:ge:multilin_sr_760_feeder_protection_relay_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ge:multilin_sr_760_feeder_protection_relay:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:ge:multilin_sr_469_motor_protection_relay_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ge:multilin_sr_469_motor_protection_relay:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:ge:multilin_sr_489_generator_protection_relay_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ge:multilin_sr_489_generator_protection_relay:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:ge:multilin_sr_745_transformer_protection_relay_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ge:multilin_sr_745_transformer_protection_relay:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:ge:multilin_sr_369_motor_protection_relay_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:ge:multilin_sr_369_motor_protection_relay:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:ge:multilin_universal_relay_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ge:multilin_universal_relay:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:ge:multilin_urplus_d90_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:ge:multilin_urplus_d90:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:ge:multilin_urplus_c90_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:ge:multilin_urplus_c90:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:ge:multilin_urplus_b95_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:ge:multilin_urplus_b95:-:*:*:*:*:*:*:*

Information

Published : 2017-06-29 20:29

Updated : 2019-10-09 16:29


NVD link : CVE-2017-7905

Mitre link : CVE-2017-7905


JSON object : View

CWE
CWE-326

Inadequate Encryption Strength

CWE-522

Insufficiently Protected Credentials

CWE-330

Use of Insufficiently Random Values

Advertisement

dedicated server usa

Products Affected

ge

  • multilin_sr_469_motor_protection_relay
  • multilin_sr_750_feeder_protection_relay_firmware
  • multilin_sr_760_feeder_protection_relay
  • multilin_sr_369_motor_protection_relay_firmware
  • multilin_sr_369_motor_protection_relay
  • multilin_sr_760_feeder_protection_relay_firmware
  • multilin_universal_relay
  • multilin_sr_489_generator_protection_relay_firmware
  • multilin_universal_relay_firmware
  • multilin_sr_745_transformer_protection_relay
  • multilin_urplus_d90
  • multilin_urplus_b95_firmware
  • multilin_urplus_c90_firmware
  • multilin_sr_489_generator_protection_relay
  • multilin_urplus_c90
  • multilin_sr_469_motor_protection_relay_firmware
  • multilin_sr_750_feeder_protection_relay
  • multilin_sr_745_transformer_protection_relay_firmware
  • multilin_urplus_b95
  • multilin_urplus_d90_firmware