1 Million Imperial & Dabman IoT Radio Devices Vulnerable to Attacks
CYBER NEWS

1 Million Imperial & Dabman IoT Radio Devices Vulnerable to Attacks

1 Star2 Stars3 Stars4 Stars5 Stars (Ancora nessuna valutazione)
Loading ...

Dangerous vulnerabilities were recently discovered in Telestar Digital GmbH IoT radio devices. The flaws could allow remote attackers to hijack vulnerable systems.




The vulnerabilities were discovered by Vulnerability Laboratory. Some of them are already assigned CVE numbersCVE-2019-13473 and CVE-2019-13474. The vulnerable devices are web radiosDabman & Imperiale” (series i & d) which are distributed in Germany by Telestar Digital GmbH. The devices utilize Bluetooth and Internet connectivity, and are based on BusyBox Linux Debian.

Correlata: Ecco come è facile Hack e sfruttare un intelligente e caffè

How were the vulnerabilities discovered?

Vulnerability Laboratory came across an anomaly on a private server which was stemming from web radio terminals of Telestar devices. As explained by security researcher Benjamin Kunz, during the investigation they noticed an undocumented Telnet service on the standard port 23 on these end devices during a port scan.

Since port forwarding was activated for all ports on this network, it could be addressed from the outside. Telnet services are less used today, because content is transmitted unencrypted and there are better alternatives today. Tuttavia, the protocol on network level and in end devices is still a bigger topic than originally thought, il ricercatore spiegato.

The researchers were able to connect and brute-force one of the radios. The attack granted them root access with full privileges. Other attacks that can be performed against the devices include changing device names, forcing a play stream, saving audio files as messages, and transmitting audio as commands locally and remotely.

Più di 1 million devices may be at risk of attacks.

Avatar

Milena Dimitrova

Uno scrittore ispirato e gestore di contenuti che è stato con SensorsTechForum per 4 anni. Gode ​​di ‘Mr. Robot’e le paure‘1984’. Incentrato sulla privacy degli utenti e lo sviluppo di malware, crede fortemente in un mondo in cui la sicurezza informatica gioca un ruolo centrale. Se il buon senso non ha senso, lei sarà lì per prendere appunti. Quelle note possono poi trasformarsi in articoli!

Altri messaggi

Lascio un commento

Il tuo indirizzo email non verrà pubblicato. I campi obbligatori sono contrassegnati *

Termine è esaurito. Ricarica CAPTCHA.

Condividi su Facebook Quota
Loading ...
Condividi su Twitter Tweet
Loading ...
Condividi su Google Plus Quota
Loading ...
Condividi su Linkedin Quota
Loading ...
Condividi su Digg Quota
Condividi su Reddit Quota
Loading ...
Condividi su Stumbleupon Quota
Loading ...