Hills ComNav version 3002-19 suffers from a weak communication channel. Traffic across the local network for the configuration pages can be viewed by a malicious actor. The size of certain communications packets are predictable. This would allow an attacker to learn the state of the system if they can observe the traffic. This would be possible even if the traffic were encrypted, e.g., using WPA2, as the packet sizes would remain observable. The communication encryption scheme is theoretically sound, but is not strong enough for the level of protection required.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-24646 Hills ComNav version 3002-19 suffers from a weak communication channel. Traffic across the local network for the configuration pages can be viewed by a malicious actor. The size of certain communications packets are predictable. This would allow an attacker to learn the state of the system if they can observe the traffic. This would be possible even if the traffic were encrypted, e.g., using WPA2, as the packet sizes would remain observable. The communication encryption scheme is theoretically sound, but is not strong enough for the level of protection required.
Fixes

Solution

Carrier recommends users upgrade to Version 4000-12 or later, which is the latest supported version at the time of this publication. Please contact the Hills distributor to acquire the firmware update. More information on this issue can be found in Carrier product security advisory number CARR-PSA-002-1121.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:28:22.881Z

Reserved: 2022-04-11T00:00:00.000Z

Link: CVE-2022-1318

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-04-20T16:15:08.420

Modified: 2024-11-21T06:40:28.793

Link: CVE-2022-1318

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.