News from 2021-11-15


Meinberg Security Advisory: [MBGSA-2021.03] Meinberg-LANTIME-Firmware V7.04.008 and V6.24.029


The LANTIME Firmware versions 7.04.008 and 6.24.029 include updates to the kernel, software tools, and changes to the Meinberg LTOS Web Interface to fix the vulnerabilities mentioned in this advisory.

Meinberg recommends updating to LANTIME Firmware version 7.04.008.

Estimation of Severity up to and Including

  • LANTIME firmware V7.04.007: severity level high (2), medium (2), low (2)
  • LANTIME firmware V6.24.028: severity level high (2), medium (2), low (2)

Updated versions:

  • LANTIME firmware: V7.04.008
  • LANTIME firmware: V6.24.029
  1. Description of Vulnerabilities

    • Third-party software:
    • LTOS Web Interface:
      • User Management:
        • CVE-2021-46903 - Denial of Service caused by deletion of system accounts (low)
          An admin user was able to delete accounts that are essential for the operation of the device (detected by milCERT Austria).

          Fixed in:
          V7.04.008 MBGID-6303 and V6.24.029 MBGID-9343

          Workaround:
          Revoke access of admin users.

      • Configuration & Firmware Management:
        • CVE-2021-46902 - Incorrect path validation of the configuration save and delete function (medium)
          An admin user was able to delete or inspect forbidden files using the Configuration & Firmware Management (detected by milCERT Austria).

          Fixed in:
          V7.04.008 MBGID-6257 and V6.24.029 MBGID-9341

          Workaround:
          Revoke access of admin users.

    • LTOS-Command-Line-Interface:
      • Login Function:
        • NOCVE - Privilege elevation (high)
          Even when "Disable Root Login" is disabled, it was possible to remotely execute arbitrary commands via shell with valid root credentials.

          Fixed in:
          V7.04.008 MBGID-6571 and V6.24.029 MBGID-9342

          Workaround:
          Use a very long passphrase for the root account and ensure that it is not saved anywhere. Also, monitor login activity to be able to monitor root account misuse.

  2. Systems affected

    All LANTIME Firmware versions before V7.04.008 and V6.24.029 are affected by these vulnerabilities. The LANTIME Firmware is used by all LANTIME M Series devices (M100, M200, M300, M400, M600, M900) as well as all LANTIME IMS Series devices (M500, M1000, M1000S, M2000S, M3000, M3000S, M4000) and the SyncFire product family (SF1000 / SF1100 / SF1200).

    The extent to which individual device users or LANTIME systems may be affected by these vulnerabilities will depend on the specific configuration, network infrastructure, and other factors. It is therefore not possible to provide a general statement on how vulnerable the systems in service actually are.

  3. Possible security measures

    The security updates are included in LANTIME Firmware version V7.04.008 and V6.24.029. Updating to these versions will eliminate the listed vulnerabilities.

    Download the latest LANTIME firmware at:

    All updates are now available for Meinberg device users. An update of the LANTIME firmware to the version 7.04.008 is recommended. Device users who cannot install 7.04.008 can use version V6.24.029.

  4. Further information

    Further details and information are available from the following websites:

    If you have any questions or need assistance, please do not hesitate to contact Meinberg Technical Support.

  5. Acknowledgments

    We would like to thank all those who have reported vulnerabilities, other errors, and also suggestions for improvements to us.

    Many thanks!


Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact