Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Red Lion Working on Fix for Old N-Tron Industrial Wireless AP Flaw

Red Lion Controls is preparing a firmware update to address a vulnerability in the N-Tron 702-W Industrial Wireless Access Point that can be exploited by an attacker to compromise communications and the integrity of the device.

Red Lion Controls is preparing a firmware update to address a vulnerability in the N-Tron 702-W Industrial Wireless Access Point that can be exploited by an attacker to compromise communications and the integrity of the device.

According to an advisory published by ICS-CERT this week, a researcher discovered hardcoded SSH and HTTPS encryption keys that are shared across N-Tron 702-W Industrial Wireless Access Point devices. Customers do not have the ability to generate new keys for their devices.

N-Tron wireless AP

An attacker can use the keys from one product to decrypt traffic from any other device. The flaw, which affects all versions of the N-Tron 702-W Industrial Wireless Access Point, can be exploited remotely even by an attacker with low skill, ICS-CERT noted.

The vulnerability was identified by researcher Neil Smith back in 2012. Smith had been working at social risk management company ZeroFOX at the time when he discovered the vulnerability.

ICS-CERT has decided to disclose the vulnerability (CVE-2012-4716) because the vendor has been unresponsive. The existence of the security hole has been made public to warn critical infrastructure asset owners of the risk of using this N-Tron equipment.

Red Lion Controls representatives told SecurityWeek that a fix for this issue is currently in development and that a new firmware version will be deployed in the coming weeks.

Red Lion customers who want to be notified when the update becomes available are advised to contact the company’s technical support team at support(at)redlion.net.

“Red Lion is committed to providing our customers with reliable, secure industrial networking devices, and will address this issue with the highest priority,” Red Lion said in an emailed statement. “Further, we’re reviewing our internal escalation procedures regarding communiques from ICS-CERT so that we may respond in a more timely fashion to their inquiries.”

Advertisement. Scroll to continue reading.

UK-based instrumentation and controls company Spectris plc acquired Mobile, Ala.-based rugged industrial networking components manufacturer N-Tron in 2010 for $51 million. In February 2013, Spectris combined N-Tron, Sixnet and Red Lion under the Red Lion brand.

N-Tron products are deployed in sectors such as energy, commercial facilities, nuclear reactors, transportation, and water and wastewater in more than 50 countries across the world.

Related: Learn More at the ICS Cyber Security Conference

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.