Flaws in Cinterion modems hit a number of vital infrastructure sectors – Cyber Tech

Severe safety flaws have been found in Cinterion mobile modems, together with vital flaws that allow distant code execution and unauthorized privilege escalation, posing nice dangers to Web of Issues (IoT) gadgets extensively discovered within the industrial, healthcare, automotive, monetary and telecom sectors.

In a Could 10 weblog submit, Kaspersky ICS CERT stated CVE-2023-47610, a heap overflow vulnerability throughout the modem’s SUPL message handles, was essentially the most alarming bug.

The researchers stated the flaw lets distant attackers execute arbitrary code through SMS, granting them unprecedented entry to the modem’s working system. Such entry additionally lets attackers manipulate RAM and flash reminiscence, growing the potential to grab full management over the modem with out authentication.

“The vulnerabilities we discovered, coupled with the widespread deployment of those gadgets in varied sectors, spotlight the potential for in depth world disruption,” stated Evgeny Goncharov, head of Kaspersky ICS CERT. “These disturbances vary from financial and operational impacts to questions of safety.”

Cinterion modems are used within the provide chain of many IoT gadgets to permit knowledge entry by mobile communication, defined Jason Soroko, senior vp of product at Sectigo. Soroko stated the vulnerabilities which can be being reported are largely about flaws in reminiscence administration that would result in unauthorized code execution, however not only for attackers in bodily possession of the machine. 

“There’s additionally a distant assault potential through a fastidiously crafted SMS message,” stated Soroko. “These are the very best precedence vulnerabilities that organizations and safety groups want to pay attention to.”

John Gallagher, vp of Viakoo Labs, stated that Cinterion mobile modems join the whole lot from municipal recycling cans to water management methods to healthcare to non-public LTE/5G networks inside enterprises. 

“These vulnerabilities have the potential to disable or disrupt the operations of IoT/OT methods and provides risk actors entry to knowledge current within the system,” stated Gallagher. “Menace actors clearly can use modem entry to additionally monitor visitors and observe operational patterns.

Gallagher added that the present mitigations provided are unrealistic for many organizations to implement. For instance, Gallagher stated proscribing bodily entry to those gadgets forgets that IoT gadgets are sometimes deployed at large-scale throughout giant bodily areas which can be laborious to make sure entry has been restricted. Likewise, disabling SMS messaging cripples one of many mobile modem’s key capabilities. 

“These mitigations are a weak protection, and finally the gadgets should be patched,” stated Gallagher.   

Add a Comment

Your email address will not be published. Required fields are marked *

x