ICS/OT

Unpatched Flaws Plague Sierra Wireless Industrial Gateways

A researcher has discovered several vulnerabilities in Sierra Wireless industrial gateways, but the vendor will not address the issues because the products are approaching end of life.

<p><strong><span><span>A researcher has discovered several vulnerabilities in Sierra Wireless industrial gateways, but the vendor will not address the issues because the products are approaching end of life.</span></span></strong></p>

A researcher has discovered several vulnerabilities in Sierra Wireless industrial gateways, but the vendor will not address the issues because the products are approaching end of life.

Security researcher Karn Ganeshen reported recently that Sierra Wireless AirLink Raven XE and XT modems are affected by several flaws. One of the issues is related to the existence of a default account that allows an attacker with access to the network to log in to the device’s web administration interface.

Ganeshen said he identified at least one device that can be accessed directly from the Internet through this vulnerability because it has port forwarding enabled. The expert believes the vendor should have forced users to change the password for this account.

Another vulnerability found by the researcher is related to the lack of anti-CSRF tokens in AceManager, a browser-based gateway management application used for Sierra’s AirLink products. The security hole allows an attacker to perform arbitrary actions if they can trick an authenticated user into clicking on a malicious link.

Ganeshen also discovered that the GET requests used by AceManager leak sensitive information, including credentials. The expert also identified several webpages that can be accessed without authentication, including ones that allow users to reboot the device and upload arbitrary files.

The affected products are deployed in various industries around the world, but the issues will not be patched because AirLink Raven XE and XT gateways will only be sold until August 31. The vendor recommends replacing them with the newer AirLink Raven RV50.

In the meantime, ICS-CERT says users have been advised to apply a series of mitigations to protect the devices against potential attacks. This includes changing default passwords, using firewalls and physical security solutions to protect devices from unauthorized access, disabling port forwarding, not accessing AceManager from Internet-connected devices, and disabling AceManager access via the cellular WAN interface.

Earlier this year, ICS-CERT published an advisory describing a medium severity file and directory information disclosure vulnerability in AceManager. The flaw, discovered by researcher Maxim Rupp, affected several AirLink gateway models.

Advertisement. Scroll to continue reading.

Related: Meteocontrol Patches Flaws in Photovoltaic Data Logger

Related: Unpatched Flaws Plague Moxa Connectivity Products

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version