1. Home
  2. Network Vulnerabilities
  3. How to remediate – Comelit Actuator Detection

How to remediate – Comelit Actuator Detection

1. Introduction

The Comelit Actuator Detection vulnerability allows an attacker to reach actuators on a remote Comelit network. This means someone could potentially control devices connected to that network, such as door entry systems or lighting controls. Businesses using Comelit systems are at risk of unauthorized access and control. A successful exploit may impact confidentiality, integrity, and availability of the controlled systems.

2. Technical Explanation

Nessus was able to connect to the remote Comelit network and initiate calls to actuators on the network. This indicates that the network is accessible from outside and does not have sufficient restrictions on communication with its actuators. There are no known CVEs associated with this specific detection, but it highlights a potential misconfiguration in network access controls. An attacker could exploit this by directly calling actuators on the network to trigger unintended actions. Affected systems include Comelit networks without proper firewalling or authentication for actuator calls.

  • Root cause: Lack of restrictions on network access to actuators.
  • Exploit mechanism: An attacker connects to the Comelit network and sends commands directly to actuators.
  • Scope: Comelit networks with exposed actuators.

3. Detection and Assessment

To confirm if a system is vulnerable, check for open ports associated with actuator communication or attempt to initiate a call to an actuator. A thorough method involves network scanning for accessible devices on the Comelit network.

  • Quick checks: Check firewall rules for any allow-all access to actuators.
  • Scanning: Nessus plugin ID 16397 can detect this issue. This is an example only, and other scanners may also provide similar functionality.
  • Logs and evidence: Review network logs for connections originating from outside the trusted network attempting to reach actuator ports.
telnet <comelit_actuator_ip> <port>

4. Solution / Remediation Steps

To fix this issue, restrict network access to actuators and implement authentication for all calls. Only allow trusted networks and devices to communicate with the Comelit system.

4.1 Preparation

  • Ensure you have access credentials for network devices and the Comelit system. Roll back plan: Restore from snapshot or revert firewall rules.
  • A change window may be required depending on the complexity of your network setup. Approval should be obtained from the IT security team.

4.2 Implementation

  1. Step 1: Configure the firewall to block all inbound connections to actuator ports except those originating from trusted networks.
  2. Step 3: Review network segmentation to isolate the Comelit network from other less-trusted networks.

4.3 Config or Code Example

Before

# Firewall rule allowing all inbound connections on actuator port
iptables -A INPUT -p tcp --dport <actuator_port> -j ACCEPT

After

# Firewall rule allowing only trusted network to access actuator port
iptables -A INPUT -s <trusted_network/subnet> -p tcp --dport <actuator_port> -j ACCEPT
iptables -A INPUT -p tcp --dport <actuator_port> -j DROP

4.4 Security Practices Relevant to This Vulnerability

Several security practices can help prevent this issue. Least privilege reduces the impact if an attacker gains access. Network segmentation isolates critical systems. Input validation blocks unsafe data from reaching actuators.

  • Practice 1: Implement least privilege, granting only necessary permissions to users and devices accessing the Comelit system.
  • Practice 2: Use network segmentation to isolate the Comelit network from other less-trusted networks.
  • Practice 3: Enforce input validation on all data sent to actuators to prevent malicious commands.

4.5 Automation (Optional)

If using infrastructure as code, update firewall rules and network configurations automatically. Add comments explaining any risky commands.

# Example Ansible playbook snippet
- name: Block actuator port except for trusted networks
  iptables:
    chain: INPUT
    protocol: tcp
    dport: <actuator_port>
    jump: DROP
    state: present

5. Verification / Validation

  • Post-fix check: Verify that the firewall rule blocks connections from untrusted networks on actuator ports.
  • Re-test: Re-run Nessus plugin ID 16397 to confirm the vulnerability is no longer detected.
  • Monitoring: Monitor network logs for any unauthorized access attempts to actuator ports.
telnet <comelit_actuator_ip> <port> # Should fail if firewall is configured correctly

6. Preventive Measures and Monitoring

Update security baselines to include restrictions on actuator access. Add checks in CI/CD pipelines to prevent similar misconfigurations. Implement a regular patch or config review cycle. For example, update CIS controls related to network segmentation and firewall rules.

  • Baselines: Update security baselines to enforce least privilege and restrict network access to actuators.
  • Pipelines: Add checks in CI/CD pipelines to scan for open ports associated with actuator communication.
  • Asset and patch process: Implement a regular review cycle for firewall rules and network configurations.

7. Risks, Side Effects, and Roll Back

Blocking legitimate traffic can disrupt service functionality. Incorrectly configured firewall rules may prevent authorized users from accessing actuators. Restore the previous snapshot or revert firewall rules to return to the previous state.

  • Risk or side effect 2: Incorrectly configured firewall rules. Mitigation: Document all changes and have a roll back plan in place.
  • Roll back: Restore from snapshot or revert firewall rules to the previous configuration.

8. References and Resources

Updated on December 27, 2025

Was this article helpful?

Related Articles