HomeMalware & ThreatsRemote Exploitation of Industrial Switch Vulnerabilities

Remote Exploitation of Industrial Switch Vulnerabilities

Published on

spot_img

Researchers from Claroty’s Team82 recently discovered three critical vulnerabilities in industrial network switches, urging users to update their firmware to avoid potential exploitation by attackers. The vulnerabilities were found in WGS-804HPT switches manufactured by Planet Technology, which are commonly used in building and home automation networks to facilitate connectivity for IoT systems, IP surveillance cameras, and wireless LAN applications. These flaws could potentially allow attackers to gain remote control over automation systems, IoT devices, and surveillance networks.

Upon investigating the switches, Team82 identified multiple vulnerabilities in the web-based management interface, specifically in the dispatcher.cgi component. One of the vulnerabilities, tracked as CVE-2024-48871, is a stack-based buffer overflow with a CVSS score of 9.8, enabling remote code execution. The second flaw, CVE-2024-52320, also with a CVSS score of 9.8, involves an operating system command injection vulnerability that allows unauthenticated attackers to execute arbitrary commands. The third vulnerability, CVE-2024-52558, with a CVSS score of 5.3, is an integer underflow flaw that can crash the device using malformed HTTP requests, leading to service disruptions.

These findings highlight the risks associated with unpatched devices in critical automation networks, as attackers could exploit these vulnerabilities to gain unauthorized access, disrupt operations, or execute arbitrary commands on the compromised devices. It is crucial for users of these switches to apply the firmware update provided by Planet Technology to mitigate these security risks effectively.

The vulnerabilities in the dispatcher.cgi component were a result of improper input validation mechanisms, allowing attackers to bypass authentication checks and execute malicious commands with root privileges. Additionally, the lack of sanitization of user-supplied data made the switch susceptible to reflected cross-site scripting attacks, potentially compromising the sessions of authenticated administrators.

To address these vulnerabilities, Planet Technology released a patched firmware update in response to Claroty’s report. Team82 replicated the switch’s architecture to create a controlled environment for dissecting the firmware and identifying the critical flaws. The researchers emphasized the importance of regularly updating firmware and implementing security best practices to protect industrial network devices from potential cyber threats.

Overall, the discovery of these vulnerabilities underscores the need for robust cybersecurity measures in industrial networks to prevent unauthorized access and ensure the integrity and security of critical infrastructure. By staying vigilant and proactive in addressing security vulnerabilities, organizations can effectively safeguard their operational technology systems from potential cyber attacks.

Source link

Latest articles

6 Metrics IT Leaders Must Prioritize for Business Resilience

In today's rapidly changing digital landscape, effective risk management and business continuity hinge on...

Six Critical Mistakes That Undermine Cyber Resilience and How to Fix Them

Breaking Down Silos: A Path to Enhanced Business Resilience Silos within organizations are increasingly recognized...

5 Essential Steps to Strengthen Your Endpoint Security and Avoid Major Mistakes

In the rapidly evolving landscape of cybersecurity, the importance of business resilience, particularly at...

20 Innovative AI and Security Products at RSAC 2026

At the recent RSAC 2026, the cybersecurity industry's major players and innovative startups converged...

More like this

6 Metrics IT Leaders Must Prioritize for Business Resilience

In today's rapidly changing digital landscape, effective risk management and business continuity hinge on...

Six Critical Mistakes That Undermine Cyber Resilience and How to Fix Them

Breaking Down Silos: A Path to Enhanced Business Resilience Silos within organizations are increasingly recognized...

5 Essential Steps to Strengthen Your Endpoint Security and Avoid Major Mistakes

In the rapidly evolving landscape of cybersecurity, the importance of business resilience, particularly at...