CVE-2018-5400

Summary

CVECVE-2018-5400
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2018-10-08 15:29:00 UTC
Updated2019-10-09 23:41:00 UTC
DescriptionThe Auto-Maskin products utilize an undocumented custom protocol to set up Modbus communications with other devices without validating those devices. The originating device sends a message in plaintext, 48:65:6c:6c:6f:20:57:6f:72:6c:64, "Hello World" over UDP ports 44444-44446 to the broadcast address for the LAN. Without verification devices respond to any of these broadcast messages on the LAN with a plaintext reply over UDP containing the device model and firmware version. Following this exchange the devices allow Modbus transmissions between the two devices on the standard Modbus port 502 TCP. Impact: An attacker can exploit this vulnerability to send arbitrary messages to any DCU or RP device through spoofing or replay attacks as long as they have access to the network. Affected releases are Auto-Maskin DCU-210E RP-210E: Versions prior to 3.7 on ARMv7.

Risk And Classification

Problem Types: CWE-346

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Hardware Arm Arm7 All All All All
Hardware Arm Arm7 All All All All
Hardware Auto-maskin Dcu 210e - All All All
Hardware Auto-maskin Dcu 210e - All All All
Operating System Auto-maskin Dcu 210e Firmware - All All All
Operating System Auto-maskin Dcu 210e Firmware - All All All
Hardware Auto-maskin Rp 210e - All All All
Hardware Auto-maskin Rp 210e - All All All
Operating System Auto-maskin Rp 210e Firmware - All All All
Operating System Auto-maskin Rp 210e Firmware - All All All

References

ReferenceSourceLinkTags
CERT Vulnerability Notes Database CERT-VN www.kb.cert.org Third Party Advisory, US Government Resource
Auto-Maskin RP210E, DCU210E, and Marine Observer Pro (Android App) | CISA MISC www.us-cert.gov
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Vendor Comments And Credit

Discovery Credit

LEGACY: Reporters: Brian Satira, Brian Olson, Organization: Project Gunsway

© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report