search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Beck GmbH IPC@Chip does not adequately validate user input thereby disclosing sensitive network data via crafted URL

Vulnerability Note VU#574739

Original Release Date: 2001-09-14 | Last Revised: 2003-04-09


An insecure default configuration in the Beck IPC@CHIP allows an intruder to obtain priviledged system information.


The Beck IPC@CHIP is a single chip embedded webserver. The Beck IPC@CHIP ships with a cgi script named "ChipCfg". Using a specially crafted url, an attacker can cause this cgi script to return sensitive network configuration data stored on the IPC@CHIP.


An intruder can gain access to sensitive network data stored on the IPC@CHIP.


According to Ernest Schloesser of Beck IPC GmbH, the API allows removal of this CGI with the CGI_REMOVE function.

Vendor Information

Affected   Unknown   Unaffected

Beck GmbH

Notified:  May 21, 2001 Updated:  July 17, 2002



Vendor Statement

Please see

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A



This vulnerability was discovered by Sentry Research Labs

This document was written by Ian A. Finlay.

Other Information

CVE IDs: CVE-2001-1341
Severity Metric: 6.75
Date Public: 2001-05-24
Date First Published: 2001-09-14
Date Last Updated: 2003-04-09 18:52 UTC
Document Revision: 14

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.