Multiple high-severity security vulnerabilities have been discovered in ConnectedIO’s ER2000 edge routers and the cloud-based management platform [1] [2] [4] [6] [7]. These vulnerabilities could potentially be exploited by malicious actors to gain unauthorized access and control over networks and devices [3].

Description

The impact of these vulnerabilities is significant [6], as attackers could fully compromise the cloud infrastructure [1] [4] [5] [6] [7], remotely execute arbitrary code [1] [2] [3] [4] [5] [6] [7], and access sensitive data [1] [2] [3] [4] [6] [7]. The vulnerabilities primarily affect the 4G ER2000 edge router and cloud services [1] [2] [7], specifically the ConnectedIO platform versions v2.1.0 and earlier [4] [5] [6]. Additionally, flaws have been found in the communication protocol used between the devices and the cloud [1] [7], MQTT [1] [3] [4] [5] [6] [7], including the use of hard-coded authentication credentials [1] [5] [6] [7]. These flaws could be used to register rogue devices and access MQTT messages containing device identifiers [1] [4] [7], Wi-Fi settings [1] [7], SSIDs [1] [5] [7], and passwords from routers [1] [7]. Threat actors could impersonate devices using leaked IMEI numbers and force devices to execute arbitrary commands [4] [6] [7]. The vulnerabilities have been assigned the following CVE identifiers: CVE-2023-33375 [1] [6] [7], CVE-2023-33376 [1] [5] [6] [7], CVE-2023-33377 [1] [5] [6] [7], and CVE-2023-33378 [1] [5] [6] [7].

Conclusion

If exploited [1] [2] [3] [4] [6] [7], these vulnerabilities could pose a serious risk to companies worldwide [1] [2] [6] [7], potentially disrupting business and production and giving attackers access to internal networks [1] [5] [6] [7]. ConnectedIO has released firmware updates to address these vulnerabilities and protect users automatically [3] [5]. Users are urged to apply these updates and follow best practices in device security to prevent operational disruptions [3], network infiltrations [3], and compromise of sensitive data [3].

References

[1] https://thehackernews.com/2023/10/high-severity-flaws-in-connectedios.html
[2] https://www.443news.com/2023/10/high-severity-flaws-in-connectedios-3g-4g-routers-raise-concerns-for-iot-security/
[3] https://www.exploitone.com/cyber-security/unveiling-the-invisible-navigating-through-the-silent-threats-in-connectedios-3g-4g-routers/
[4] https://cybermaterial.com/security-flaws-in-connectedio-routers/
[5] https://cybersecuritynews.com/connectedios-3g-4g-routers-vulnerability/
[6] https://cybersec84.wordpress.com/2023/10/09/critical-flaws-found-in-connectedio-3g-4g-routers-posing-serious-iot-security-risks/
[7] https://beker.uk/2023/10/09/high-severity-flaws-in-connectedios-3g-4g-routers-raise-concerns-for-iot-security/