
A set of 21 newly found vulnerabilities impression Sierra OT/IoT routers and threaten essential infrastructure with distant code execution, unauthorized entry, cross-site scripting, authentication bypass, and denial of service assaults.
The failings found by Forescout Vedere Labs have an effect on Sierra Wi-fi AirLink mobile routers and open-source parts like TinyXML and OpenNDS (open Community Demarcation Service).
AirLink routers are extremely regarded within the subject of business and mission-critical functions resulting from high-performance 3G/4G/5G and WiFi and multi-network connectivity.
Numerous fashions are utilized in complicated eventualities like passenger WiFi in transit techniques, car connectivity for emergency companies, long-range gigabit connectivity to subject operations, and numerous different performance-intensive duties.
Forescout says Sierra routers are present in authorities techniques, emergency companies, power, transportation, water and wastewater amenities, manufacturing items, and healthcare organizations.

Flaws and impression
Forescout’s researchers found 21 new vulnerabilities in Sierra AirLink mobile routers and the TinyXML and OpenNDS parts, that are a part of different merchandise, too.
Solely one of many safety points has been rated essential, eight of them obtained a excessive severity rating, and a dozen current a medium threat.
Essentially the most noteworthy vulnerabilities are summarized beneath:
- CVE-2023-41101 (Distant Code Execution in OpenDNS – essential severity rating of 9.6)
- CVE-2023-38316 (Distant Code Execution in OpenDNS – excessive severity rating of 8.8)
- CVE-2023-40463 (Unauthorized Entry in ALEOS – excessive severity rating of 8.1)
- CVE-2023-40464 (Unauthorized Entry in ALEOS – excessive severity rating of 8.1)
- CVE-2023-40461 (Cross Web site Scripting in ACEmanager – excessive severity rating of 8.1)
- CVE-2023-40458 (Denial of Service in ACEmanager – excessive severity rating of 7.5)
- CVE-2023-40459 (Denial of Service in ACEmanager – excessive severity rating of 7.5)
- CVE-2023-40462 (Denial of Service in ACEmanager associated to TinyXML – excessive severity rating of 7.5)
- CVE-2023-40460 (Cross Web site Scripting in ACEmanager – excessive severity rating of 7.1)
For no less than 5 of the above flaws, attackers don’t require authentication to use them. For a number of others affecting OpenNDS, authentication is probably going not required, as widespread assault eventualities contain shoppers trying to connect with a community or service.

Based on the researchers, an attacker may exploit a few of the vulnerabilities “to take full management of an OT/IoT router in essential infrastructure.” The compromise may result in community disruption, allow espionage, or transfer laterally to extra necessary property, and malware deployment.
“Aside from human attackers, these vulnerabilities may also be utilized by botnets for computerized propagation, communication with command-and-control servers, in addition to performing DoS assaults,” the researchers clarify.

After working a scan on Shodan search enging for internet-connected units, Forescout researchers discovered over 86,000 AirLink routers uncovered on-line in essential organizations engaged in energy distribution, car monitoring, waste administration, and nationwide well being companies.
About 80% of the uncovered techniques are in america, adopted by Canada, Australia, France, and Thailand.
Of these, fewer than 8,600 have utilized patches to vulnerabilities disclosed in 2019, and greater than 22,000 are uncovered to man-in-the-middle assaults resulting from utilizing a default SSL certificates.

Remediation recommendation
The really helpful motion for directors is to improve to the ALEOS (AirLink Embedded Working System) model 4.17.0, which addresses all flaws, or no less than ALEOS 4.9.9, which accommodates all fixes aside from these impacting OpenNDS captive portals that set a barrier between the general public web and an area space community.
The OpenNDS venture has additionally launched safety updates for the vulnerabilities impacting the open-source venture, with model 10.1.3.
Word that TinyXML is now abandonware, so there might be no fixes for the CVE-2023-40462 vulnerability that impacts the venture.
Forescout additionally recommends taking the next further actions for enhanced safety:
- Change default SSL certificates in Sierra Wi-fi routers and comparable units.
- Disable or prohibit non-essential companies like captive portals, Telnet, and SSH.
- Implement an online software firewall to guard OT/IoT routers from net vulnerabilities.
- Set up an OT/IoT-aware IDS to watch exterior and inside community site visitors for safety breaches.
Forescout has launched a technical report that explains the vulnerabilities and the situations that enable exploiting them.
Based on the corporate, risk actors are more and more focusing on routers and community infrastructure environments, launching assaults with customized malware that use the units for persistence and espionage functions.
For cybercriminals, routers are normally a method to proxy malicious site visitors or to extend the measurement of their botnet.