HomeRisk ManagementsMillions of IoT Devices Vulnerable to Exploits in Integrated Cellular Modem -...

Millions of IoT Devices Vulnerable to Exploits in Integrated Cellular Modem – Source: www.darkreading.com

Published on

spot_img

Millions of IoT devices across various sectors are currently facing significant vulnerabilities in a cellular modem technology that poses a serious risk of compromise. The vulnerabilities, particularly in Cinterion modems from Telit, include remote code execution flaws that could potentially allow attackers to exploit the devices for malicious purposes.

The most concerning vulnerability identified is a memory heap overflow vulnerability (CVE-2023-47610) that enables remote attackers to execute arbitrary code via SMS on affected devices. Researchers from Kaspersky discovered a total of seven severe vulnerabilities in the Telit modems and reported them to the vendor last November. Despite the notification, Telit has only issued patches to address some of the flaws, leaving several devices still vulnerable to exploitation.

Telit Cinterion modems are commonly integrated into IoT devices used in various industries such as industrial equipment, smart meters, vehicle tracking, healthcare, and medical devices. Due to the widespread use of these modems and the nested integration with products from other vendors, identifying all affected devices has proven to be a challenging task.

The potential impact of these vulnerabilities is extensive, with millions of devices across different sectors possibly being affected. The most severe vulnerability, CVE-2023-47610, could allow attackers to access the modem’s operating system, manipulate device memory, and gain complete control over its functions. Such unauthorized access could lead to severe consequences, including disruptions to essential operations and threats to public safety and security.

Kaspersky has recommended that organizations using vulnerable IoT devices disable nonessential SMS capabilities and implement private Access Point Names (APNs) with strict security settings for dedicated connectivity. Telecom vendors are also urged to implement network-level controls to prevent the delivery of malicious SMS messages to vulnerable devices, particularly for CVE-2023-47610.

In addition to the most severe vulnerability, the other six vulnerabilities identified by Kaspersky (CVE-2023-47611 through CVE-2023-47616) relate to how the devices handle Java applets, allowing attackers to execute various malicious actions. Enforcing rigorous digital signature verification, controlling physical access to devices, and conducting regular security audits and updates are recommended measures to mitigate the risks associated with these vulnerabilities.

The delay in disclosing the details of these vulnerabilities was intentional to give Telit the opportunity to inform customers and implement necessary protective measures. As attacks on IoT environments, especially in industrial and operational technology settings, continue to rise, the importance of addressing vulnerabilities in IoT devices becomes paramount.

Recent reports highlight a concerning trend of increasing attacks on IoT and OT networks, with a surge in IoT vulnerabilities being exploited by adversaries. The case of 11 vulnerabilities in industrial routers impacting thousands of industrial IoT products underscores the pressing need for vendors to promptly patch reported vulnerabilities to safeguard against potential cyber threats.

In conclusion, the discovery of severe vulnerabilities in Telit Cinterion modems emphasizes the critical need for proactive security measures in IoT devices to prevent potential exploitation by threat actors. Collaboration between vendors, researchers, and organizations is essential to mitigate the risks posed by these vulnerabilities and safeguard the integrity and security of IoT ecosystems.

Source link

Latest articles

CyberArk Embraces Machine Identity with Venafi Deal

The recent trend in cyber attacks has shifted to targeting machine identities in addition...

ShrinkLocker: Turning BitLocker into ransomware – Source: securelist.com

In a recent incident response engagement, a clever technique involving the misuse of the...

Seventy Percent of CISOs Concerned About Their Organization’s Vulnerability to Significant Attacks: The Register

Chief information security officers worldwide are feeling anxious about the future, with a recent...

Stop GPS Data Communication from Foreign Satellites in the United States

The Federal Communications Commission (FCC) has recently pushed for a permanent ban on potential...

More like this

CyberArk Embraces Machine Identity with Venafi Deal

The recent trend in cyber attacks has shifted to targeting machine identities in addition...

ShrinkLocker: Turning BitLocker into ransomware – Source: securelist.com

In a recent incident response engagement, a clever technique involving the misuse of the...

Seventy Percent of CISOs Concerned About Their Organization’s Vulnerability to Significant Attacks: The Register

Chief information security officers worldwide are feeling anxious about the future, with a recent...
en_USEnglish