Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Cisco Says Flaws in Industrial Routers, BGP Tool Remain Unpatched 8 Months After Disclosure

Cisco Talos has disclosed the details of apparently unpatched vulnerabilities in MC Technologies industrial routers and the GoCast BGP tool.

Cisco’s threat intelligence and research unit Talos has disclosed the details of several apparently unpatched vulnerabilities in an MC Technologies industrial router and the GoCast BGP tool.

Talos published advisories for the vulnerabilities last month, and on Monday released a blog post announcing that they have yet to be patched, despite being responsibly disclosed to vendors roughly eight months ago. The advisories indicate that the company first reached out to the impacted vendors in March (MC Technologies) and April (GoCast).

In the case of MC Technologies, a Talos researcher discovered four high-severity vulnerabilities that can lead to arbitrary command injection in the MC LR industrial router.

MC Technologies is a Germany-based company that provides IoT and Industry 4.0 solutions, including industrial and 5G routers, cellular modems, data terminals, antennas, wireless modules, smart meter accessories, and sensors.

Talos found that the MC LR router, specifically the web interface of version 2.10.5, is affected by four OS command injection vulnerabilities that can be exploited by an authenticated attacker.

“A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities,” Talos explained in its advisories. 

Advertisement. Scroll to continue reading.

In GoCast, an open source tool designed for controller BGP route advertisements from a host, Talos discovered three critical OS command injection flaws that can be exploited by an unauthenticated attacker. 

“A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an unauthenticated HTTP request to trigger this vulnerability,” Talos explained.

Technical details have been made public by Talos for each of the vulnerabilities. 

SecurityWeek has reached out to both MC Technologies and GoCast’s developer for comment on Cisco Talos’ findings. This article will be updated if they respond. 

Related: Siemens and Rockwell Tackle Industrial Cybersecurity, but Face Customer Hesitation 

Related: Critical Vulnerabilities Expose mbNET.mini, Helmholz Industrial Routers to Attacks

Related: D-Link Warns of RCE Vulnerability in Legacy Routers

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.