Innominate Security Technologies, a Germany-based company that specializes in communication security components and solutions for industrial networks, has fixed a vulnerability affecting its mGuard series industrial security routers.
According to an advisory from ICS-CERT, the flaw, which has been assigned the CVE-2014-2356 identifier, could be exploited remotely by an unauthenticated attacker to obtain configuration information.
Innominate mGuard devices are designed for protecting industrial Ethernet networks, and for conducting secure remote maintenance of ICS/SCADA systems via the Internet. They’re often used in critical infrastructure sectors such as manufacturing, communications, public health and healthcare. The products enable users that are logged in to download a configuration snapshot for diagnostics purposes.
Applied Risk, a company that specializes in securing critical infrastructure, has found that an attacker could bypass authorization checks and download such a configuration snapshot through the HTTPS CGI interface with the aid of a specially crafted URL.
“The configuration snapshot contains configuration data, current system information and log files, but no confidential data such as RSA private keys, Pre-Shared keys or passwords. An attacker might gather information about network topology, traffic flows, and other connected systems from this data,” ICS-CERT noted in its advisory.
In it’s own advisory, Applied Risk revealed that the exposed information includes SNMP community strings, user credentials, firewall rulesets, and internal hostnames and IP addresses.
“The vulnerability is remotely exploitable and could allow an attacker to map internal networks and identify potential targets as part of reconnaissance activities,” Applied Risk said.
According to Innominate, all mGuard devices running firmware version 4.0.0 through 8.0.2 are affected. More recent firmware versions (8.0.3, 8.1.0, 8.1.1) are not affected, so customers are advised to upgrade their installations. Alternatively, the company has released a hotfix for the vulnerability.
As a precaution, Innominate also recommends the limitation of access to administrative interfaces via firewall rules.
Related: 2014 ICS Cyber Security Conference to Take Place October 20-23 in Atlanta
Related: 2014 ICS Cyber Security Conference Call for Presentations Now Open

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Ransomware Group Used MOVEit Exploit to Steal Data From Dozens of Organizations
- Cybersecurity M&A Roundup: 36 Deals Announced in May 2023
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- Apple Denies Helping US Government Hack Russian iPhones
- Zero-Day in MOVEit File Transfer Software Exploited to Steal Data From Organizations
- Russia Blames US Intelligence for iOS Zero-Click Attacks
- Cisco Acquiring Armorblox for Predictive and Generative AI Technology
- Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks
Latest News
- Dozens of Malicious Extensions Found in Chrome Web Store
- What if the Current AI Hype Is a Dead End?
- Microsoft Makes SMB Signing Default Requirement in Windows 11 to Boost Security
- Zyxel Urges Customers to Patch Firewalls Against Exploited Vulnerabilities
- Gigabyte Rolls Out BIOS Updates to Remove Backdoor From Motherboards
- SBOMs – Software Supply Chain Security’s Future or Fantasy?
- Ransomware Group Used MOVEit Exploit to Steal Data From Dozens of Organizations
- Cybersecurity M&A Roundup: 36 Deals Announced in May 2023
