Article Details

Scrape Timestamp (UTC): 2023-10-17 10:18:18.419

Source: https://thehackernews.com/2023/10/experts-warn-of-severe-flaws-affecting.html

Original Article Text

Click to Toggle View

Experts Warn of Severe Flaws Affecting Milesight Routers and Titan SFTP Servers. A severity flaw impacting industrial cellular routers from Milesight may have been actively exploited in real-world attacks, new findings from VulnCheck reveal. Tracked as CVE-2023-43261 (CVSS score: 7.5), the vulnerability has been described as a case of information disclosure that affects UR5X, UR32L, UR32, UR35, and UR41 routers before version 35.3.0.7 that could enable attackers to access logs such as httpd.log as well as other sensitive credentials. As a result, this could permit remote and unauthenticated attackers to gain unauthorized access to the web interface, thereby making it possible to configure VPN servers and even drop firewall protections. "This vulnerability becomes even more severe as some routers allow the sending and receiving of SMS messages," security researcher Bipin Jitiya, who discovered the issue, said earlier this month. "An attacker could exploit this functionality for fraudulent activities, potentially causing financial harm to the router owner." Now, according to VulnCheck's Jacob Baines, there is evidence that the flaw may have been exploited on a small-scale in the wild. "We observed 5.61.39[.]232 attempting to log into six systems on October 2, 2023," Baines said. "The affected systems' IP addresses geolocate to France, Lithuania, and Norway. They don't appear to be related, and all use different non-default credentials." On four of the six machines, the threat actor is said to have successfully authenticated on the first attempt. On the fifth system, the login was successful the second time, and on the sixth, the authentication resulted in failure. The credentials used to pull off the attack were extracted from the httpd.log, alluding to the weaponization of CVE-2023-43261. There is no evidence of any further malicious actions, although it appears that the unknown actor checked the settings and status pages. According to VulnCheck, while there are approximately 5,500 internet-exposed Milesight routers, only about 5% are running vulnerable firmware versions, and hence susceptible to the flaw. "If you have a Milesight Industrial Cellular Router, it's probably wise to assume all the credentials on the system have been compromised and to simply generate new ones, and ensure no interfaces are reachable via the internet," Baines said. Six Flaws Discovered in Titan MFT and Titan SFTP Servers The disclosure comes as Rapid7 detailed several security flaws in South River Technologies' Titan MFT and Titan SFTP servers that, if exploited, could allow remote superuser access to affected hosts. The list of vulnerabilities is as follows - "Successful exploitation of several of these issues grants an attacker remote code execution as the root or SYSTEM user," the company said. "However, all issues are post-authentication and require non-default configurations and are therefore unlikely to see wide scale exploitation."

Daily Brief Summary

CYBERCRIME // Industrial Cellular Routers of Milesight at Risk due to Severity Flaw Exploitation, and Titan MFT, Titan SFTP Servers Vulnerable

A significant severity flaw impacting industrial cellular routers from Milesight is suspected to be exploited in real-world attacks according to findings from VulnCheck. This vulnerability can expose log and credential information to remote, unauthorized attackers.

Affecting UR5X, UR32L, UR32, UR35, and UR41 routers prior to version 35.3.0.7, this flaw could allow unsanctioned control over VPN servers. Further, it can be used to drop firewall protections rendering the network defenceless.

An additional layer of threat is exposed since some routers permit sending and receiving SMS messages – attackers could exploit this for fraudulent activities causing financial damages.

There is evidence to suggest small scale, real-world exploitation of this flaw with successful unauthorized access attempts on systems reported in France, Lithuania, and Norway. Attackers were able to extract login credentials from httpd.log, indicating the weaponization of the flaw.

Although 95% of approximately 5,500 internet-exposed Milesight routers are not susceptible to this flaw due to non-vulnerable firmware versions, it is advisable to assume a system-wide compromise and to refresh all credentials and limit the internet reachability of interfaces.

Concurrently, multiple security flaws have been identified in South River Technologies’ Titan MFT and Titan SFTP servers, potentially granting remote super-user access to the affected hosts. Despite the high risk involved, large scale exploitation is deemed unlikely due to the requirements of non-default configurations and post-authentication environment for the vulnerabilities.