HomeMalware & ThreatsCinterion IoT Cellular Modules at Risk of SMS Compromise

Cinterion IoT Cellular Modules at Risk of SMS Compromise

Published on

spot_img

A recent cybersecurity alert has highlighted a critical vulnerability in Cinterion cellular modems, which are extensively utilized in various sectors such as manufacturing, healthcare, telecommunications, and financial services. The vulnerability, exposed via malicious SMS messages, allows remote attackers to execute arbitrary code on the targeted system.

According to the U.S. National Vulnerability Database, multiple modems manufactured by Telit Cinterion are susceptible to this vulnerability, enabling attackers to gain unauthorized access to the modem’s operating system. This flaw poses a significant security risk as it grants attackers the ability to manipulate RAM and flash memory, potentially gaining complete control over the modem’s functionalities without the need for authentication or physical access.

Rated at 9.8 on the CVSS severity scale, this vulnerability has the potential to compromise the entire system, including operational technology (OT) and information technology (IT) networks. Kaspersky, a cybersecurity firm based in Moscow, reported seven zero-day flaws to Telit Cinterion, highlighting the need for immediate action to address these vulnerabilities.

To mitigate these risks, Kaspersky recommends disabling SMS messaging capabilities on devices with these modems whenever possible. Additionally, users are advised to implement private access point names (APNs) with stringent security configurations to limit the impact of any potential exploit. Furthermore, Kaspersky identified six other zero-day vulnerabilities related to the handling of Java-based applications, known as MIDlets, in these devices. These vulnerabilities could lead to unauthorized code execution with elevated privileges, posing a threat to data confidentiality and broader network security.

Security researchers from Kaspersky presented their findings at the OffensiveCon security conference in Berlin, emphasizing the need for rigorous digital signature verification for MIDlets and conducting regular security audits and updates. The vulnerabilities are present in various Telit Cinterion modules, raising concerns about supply chain security and the need for extensive efforts to manage risks associated with these flaws.

The history of Cinterion modules dates back to 2008 when they were developed by Cinterion Wireless Modules, a German M2M manufacturer. Subsequent acquisitions by Gemalto, Thales Group, and Telit have evolved the product line, leading to the current vulnerabilities being exposed. This isn’t the first time critical vulnerabilities have been discovered in Cinterion modules, as previous instances, such as the directory traversal flaw detailed by IBM’s X-Force Red in 2022, have highlighted security risks associated with these devices.

Efforts to address these vulnerabilities require collaboration between device manufacturers, regulators, and telecom operators to ensure timely patching and mitigation strategies. The revelation of these vulnerabilities underscores the importance of robust cybersecurity measures in safeguarding critical infrastructure and operational technology environments from potential threats.

Source link

Latest articles

India and Estonia Form Cyber Security Partnership to Address Risks Posed by Chinese Hackers

India and Estonia, two countries with different strengths in the field of cybersecurity, are...

93% of vulnerabilities remain unanalyzed by NVD since February

The recent slowdown at the National Vulnerability Database has caused a backlog of 93%...

CyberArk Embraces Machine Identity with Venafi Deal

The recent trend in cyber attacks has shifted to targeting machine identities in addition...

ShrinkLocker: Turning BitLocker into ransomware – Source: securelist.com

In a recent incident response engagement, a clever technique involving the misuse of the...

More like this

India and Estonia Form Cyber Security Partnership to Address Risks Posed by Chinese Hackers

India and Estonia, two countries with different strengths in the field of cybersecurity, are...

93% of vulnerabilities remain unanalyzed by NVD since February

The recent slowdown at the National Vulnerability Database has caused a backlog of 93%...

CyberArk Embraces Machine Identity with Venafi Deal

The recent trend in cyber attacks has shifted to targeting machine identities in addition...
en_USEnglish