Vulnerabilities in industrial cellular routers’ cloud management platforms

Issue 2/3 2023 Industrial (Industry), Information Security, Security Services & Risk Management, IoT & Automation

OTORIO, a provider of operational technology (OT) cyber and digital risk management solutions, announced that three significant industrial cellular router vendors have vulnerabilities in their cloud management platforms that expose customers’ operational networks to external attack. This raises questions about the safety of connecting OT to the cloud and suggests a need for standard industry regulations to eliminate such security risks.

An industrial cellular router allows multiple devices to connect to the internet from a cellular network. It is commonly used in industrial settings, such as manufacturing plants or oil rigs, where traditional wired internet connections may not be available or reliable. Vendors of these devices employ cloud platforms to provide customers with remote management, scalability, analytics and security.

However, OTORIO’s research found 11 vulnerabilities in the cloud platforms studied, allowing remote code execution and full control over hundreds of thousands of devices and OT networks – in some cases, even those not actively configured to use the cloud.

OTORIO Security Researcher, Roni Gavrilov, shared key findings and remediation tips at Black Hat Asia 2023 (a white paper on the topic is available here).

“As the deployment of IIoT devices becomes more popular, it's important to be aware that their cloud management platforms may be targeted by threat actors,” said Gavrilov. “A single IIoT vendor platform being exploited could act as a pivot point for attackers, accessing thousands of environments at once.”

OTORIO discovered a wide range of attack vectors based on the security level of the vendor's cloud platform, including several vulnerabilities in M2M (machine-to-machine) protocols and weak asset registration mechanisms. In some cases, these security gaps enable attackers to:

• Gain root access through a reverse-shell.

• Compromise devices in the production network, facilitating unauthorised access and control with root privileges.

• Compromise devices, exfiltrate sensitive information, and perform operations such as shutdown.

Some attacks require identifiers like Media Access Control (MAC) address, serial number or International Mobile Equipment Identity (IMEI) to breach cloud-connected devices, but others do not. One serious issue affecting all three vendors is that their platforms expose devices that have not been configured to use the cloud. Furthermore, breaches of these devices may bypass all the security layers in the Purdue Enterprise Reference Architecture Model for several different vendors.

Find out more at www.otorio.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Perspectives on personal care monitoring and smart surveillance
Leaderware Editor's Choice Surveillance Smart Home Automation IoT & Automation
Dr Craig Donald believes smart surveillance offers a range of options for monitoring loved ones, but making the right choice is not always as simple as selecting the latest technology.

Read more...
On-camera AI and storage create added benefits
Elvey Security Technologies AI & Data Analytics Surveillance IoT & Automation
The days of standalone security systems are long past, and the drive is now to educate system integrators, installers, and end users on the return on investment that can be derived from intelligent, integrated BMS, IoT and security systems.

Read more...
Cybersecurity and AI
AI & Data Analytics Information Security
Cybersecurity is one of the primary reasons that detecting the commonalities and threats of what is otherwise completely unknown is possible with tools such as SIEM and endpoint protection platforms.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...
Empowering cities with intelligent security solutions
Secutel Technologies Surveillance IoT & Automation
By leveraging advanced AI analytics, real-time data collection, and seamless integration capabilities, cities can address pressing security challenges and create a safer environment for residents.

Read more...
How to prevent and survive fires
Fire & Safety Security Services & Risk Management
Since its launch in August 2023, Fidelity SecureFire, a division of the Fidelity Services Group, has been making significant strides in revolutionising fire response services in South Africa.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...