Published:2024/08/22  Last Updated:2024/08/29

JVN#83440451
Multiple Safie products vulnerable to improper server certificate verification

Overview

Multiple Safie products are vulnerable to improper server certificate verification.

Products Affected

  • QBiC CLOUD CC-2L v1.1.30 and earlier
  • Safie One v1.8.2 and earlier

Description

Multiple Safie products are vulnerable to improper server certificate verification (CWE-295).
The product can be operated via port 11029/TCP and Bluetooth, and its communications are AES encrypted. The product user can obtain the encryption key from the cloud server based on the device-specific information. The user who has obtained the device-specific information can directly operate the device (even if it is not owned by the user).

Impact

A man-in-the-middle attack may allow an attacker to obtain and/or alter communications of the affected product, resulting in arbitrary OS command execution.

Solution

Update the Software
Update the software to the latest version according to the information provided by the developer.

In addition to the update for the affected products, a security measure is deployed on the cloud server side on July 24, 2024.

Vendor Status

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Base Score: 4.2
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)

Comment

This analysis chooses AV:A assuming a situation where a man-in-the-middle attack is carried out by an attacker who is within the range of Bluetooth or wireless LAN signals.

Credit

Taizoh Tsukamoto of Mitsui Bussan Secure Directions, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2024-39771
JVN iPedia JVNDB-2024-000086

Update History

2024/08/29
Information under the section [Impact] was updated