HomeMalware & ThreatsRemote Exploitation of Industrial Switch Vulnerabilities

Remote Exploitation of Industrial Switch Vulnerabilities

Published on

spot_img

Researchers from Claroty’s Team82 recently discovered three critical vulnerabilities in industrial network switches, urging users to update their firmware to avoid potential exploitation by attackers. The vulnerabilities were found in WGS-804HPT switches manufactured by Planet Technology, which are commonly used in building and home automation networks to facilitate connectivity for IoT systems, IP surveillance cameras, and wireless LAN applications. These flaws could potentially allow attackers to gain remote control over automation systems, IoT devices, and surveillance networks.

Upon investigating the switches, Team82 identified multiple vulnerabilities in the web-based management interface, specifically in the dispatcher.cgi component. One of the vulnerabilities, tracked as CVE-2024-48871, is a stack-based buffer overflow with a CVSS score of 9.8, enabling remote code execution. The second flaw, CVE-2024-52320, also with a CVSS score of 9.8, involves an operating system command injection vulnerability that allows unauthenticated attackers to execute arbitrary commands. The third vulnerability, CVE-2024-52558, with a CVSS score of 5.3, is an integer underflow flaw that can crash the device using malformed HTTP requests, leading to service disruptions.

These findings highlight the risks associated with unpatched devices in critical automation networks, as attackers could exploit these vulnerabilities to gain unauthorized access, disrupt operations, or execute arbitrary commands on the compromised devices. It is crucial for users of these switches to apply the firmware update provided by Planet Technology to mitigate these security risks effectively.

The vulnerabilities in the dispatcher.cgi component were a result of improper input validation mechanisms, allowing attackers to bypass authentication checks and execute malicious commands with root privileges. Additionally, the lack of sanitization of user-supplied data made the switch susceptible to reflected cross-site scripting attacks, potentially compromising the sessions of authenticated administrators.

To address these vulnerabilities, Planet Technology released a patched firmware update in response to Claroty’s report. Team82 replicated the switch’s architecture to create a controlled environment for dissecting the firmware and identifying the critical flaws. The researchers emphasized the importance of regularly updating firmware and implementing security best practices to protect industrial network devices from potential cyber threats.

Overall, the discovery of these vulnerabilities underscores the need for robust cybersecurity measures in industrial networks to prevent unauthorized access and ensure the integrity and security of critical infrastructure. By staying vigilant and proactive in addressing security vulnerabilities, organizations can effectively safeguard their operational technology systems from potential cyber attacks.

Source link

Latest articles

NCSC Advises Organizations Against Hastily Adopting Agentic AI

UK’s National Cyber Security Centre Urges Caution on Agentic AI Implementation The UK’s National Cyber...

Securing the AI Supply Chain in the European Union

The European Union (EU) is poised to elevate its Artificial Intelligence (AI) strategy into...

Internet Explorer is Gone, but Its Ghost Still Powers Malware

Legacy Software Security Risks: The Ongoing Threat of MSHTA Even After Internet Explorer's Retirement...

AI Agents for Web Testing and Security Validation

In a significant advancement for software development, researchers have introduced an innovative AI-driven testing...

More like this

NCSC Advises Organizations Against Hastily Adopting Agentic AI

UK’s National Cyber Security Centre Urges Caution on Agentic AI Implementation The UK’s National Cyber...

Securing the AI Supply Chain in the European Union

The European Union (EU) is poised to elevate its Artificial Intelligence (AI) strategy into...

Internet Explorer is Gone, but Its Ghost Still Powers Malware

Legacy Software Security Risks: The Ongoing Threat of MSHTA Even After Internet Explorer's Retirement...