HomeRisk ManagementsMillions of IoT Devices Vulnerable to Exploits in Integrated Cellular Modem -...

Millions of IoT Devices Vulnerable to Exploits in Integrated Cellular Modem – Source: www.darkreading.com

Published on

spot_img

Millions of IoT devices across various sectors are currently facing significant vulnerabilities in a cellular modem technology that poses a serious risk of compromise. The vulnerabilities, particularly in Cinterion modems from Telit, include remote code execution flaws that could potentially allow attackers to exploit the devices for malicious purposes.

The most concerning vulnerability identified is a memory heap overflow vulnerability (CVE-2023-47610) that enables remote attackers to execute arbitrary code via SMS on affected devices. Researchers from Kaspersky discovered a total of seven severe vulnerabilities in the Telit modems and reported them to the vendor last November. Despite the notification, Telit has only issued patches to address some of the flaws, leaving several devices still vulnerable to exploitation.

Telit Cinterion modems are commonly integrated into IoT devices used in various industries such as industrial equipment, smart meters, vehicle tracking, healthcare, and medical devices. Due to the widespread use of these modems and the nested integration with products from other vendors, identifying all affected devices has proven to be a challenging task.

The potential impact of these vulnerabilities is extensive, with millions of devices across different sectors possibly being affected. The most severe vulnerability, CVE-2023-47610, could allow attackers to access the modem’s operating system, manipulate device memory, and gain complete control over its functions. Such unauthorized access could lead to severe consequences, including disruptions to essential operations and threats to public safety and security.

Kaspersky has recommended that organizations using vulnerable IoT devices disable nonessential SMS capabilities and implement private Access Point Names (APNs) with strict security settings for dedicated connectivity. Telecom vendors are also urged to implement network-level controls to prevent the delivery of malicious SMS messages to vulnerable devices, particularly for CVE-2023-47610.

In addition to the most severe vulnerability, the other six vulnerabilities identified by Kaspersky (CVE-2023-47611 through CVE-2023-47616) relate to how the devices handle Java applets, allowing attackers to execute various malicious actions. Enforcing rigorous digital signature verification, controlling physical access to devices, and conducting regular security audits and updates are recommended measures to mitigate the risks associated with these vulnerabilities.

The delay in disclosing the details of these vulnerabilities was intentional to give Telit the opportunity to inform customers and implement necessary protective measures. As attacks on IoT environments, especially in industrial and operational technology settings, continue to rise, the importance of addressing vulnerabilities in IoT devices becomes paramount.

Recent reports highlight a concerning trend of increasing attacks on IoT and OT networks, with a surge in IoT vulnerabilities being exploited by adversaries. The case of 11 vulnerabilities in industrial routers impacting thousands of industrial IoT products underscores the pressing need for vendors to promptly patch reported vulnerabilities to safeguard against potential cyber threats.

In conclusion, the discovery of severe vulnerabilities in Telit Cinterion modems emphasizes the critical need for proactive security measures in IoT devices to prevent potential exploitation by threat actors. Collaboration between vendors, researchers, and organizations is essential to mitigate the risks posed by these vulnerabilities and safeguard the integrity and security of IoT ecosystems.

Source link

Latest articles

ToyMaker Leverages LAGTOY to Offer Access to CACTUS Ransomware Gangs for Double Extortion – Source: thehackernews.com

Emerging Threat: ToyMaker Acts as Broker for Ransomware Gangs In a striking revelation, cybersecurity researchers...

Proofpoint Launches Integrated Platforms to Address Data and Cybersecurity Risks

Proofpoint Unveils Advanced Cybersecurity Solutions to Mitigate Human Error Vulnerabilities In a bid to enhance...

Reasons Developers Should Pay Attention to Generative AI Regardless of Their AI Expertise

Software development stands on the brink of a significant transformation, heralded by the rapid...

FBI Offers Reward for Tips on Salt Typhoon

The Federal Bureau of Investigation (FBI), in coordination with the U.S. Department of State,...

More like this

ToyMaker Leverages LAGTOY to Offer Access to CACTUS Ransomware Gangs for Double Extortion – Source: thehackernews.com

Emerging Threat: ToyMaker Acts as Broker for Ransomware Gangs In a striking revelation, cybersecurity researchers...

Proofpoint Launches Integrated Platforms to Address Data and Cybersecurity Risks

Proofpoint Unveils Advanced Cybersecurity Solutions to Mitigate Human Error Vulnerabilities In a bid to enhance...

Reasons Developers Should Pay Attention to Generative AI Regardless of Their AI Expertise

Software development stands on the brink of a significant transformation, heralded by the rapid...