Otorio and Claroty, two industrial cybersecurity firms, have collaborated to conduct a comprehensive analysis of Teltonika products and have uncovered potentially severe vulnerabilities that put numerous organizations at risk of remote hacker attacks.
Teltonika Networks, a company based in Lithuania, produces a range of networking solutions, including LTE routers, gateways, modems, and more. These products are widely used across various industrial, energy, utilities, smart city, transportation, enterprise, and retail sectors.
It is important for businesses to prioritize implementing a business VPN solution for security purposes. This solution guarantees secure remote access and enhances network security by establishing IP-based Access Controls. This is especially crucial in light of the recent vulnerabilities found in Teltonika Networks’ products, including their cellular routers with plate numbers RUT241 and RUT955 as well as their Teltonika Remote Management System (RMS). These vulnerabilities were discovered by researchers from Otorio and Claroty.
Through their research, they identified eight distinct types of security vulnerabilities, briefly described in an advisory published by the US Cybersecurity and Infrastructure Security Agency (CISA) on May 11.
What’s been done?
- Upon notification, Teltonika promptly released patches for the RMS platform and the RUT routers to address these vulnerabilities.
- The vulnerabilities found in the RMS platform can be exploited to execute arbitrary code or commands with elevated privileges, gain unauthorized access to information, and route connections to remote servers. The router vulnerabilities allow for arbitrary code or command execution.
Noam Moshe, a vulnerability researcher at Claroty, explained that “some of the vulnerabilities and exploit chains discovered do not require any permissions or credentials for the affected devices. Additionally, thousands of devices are currently accessible from the internet, making them vulnerable to exploitation. Moreover, certain attack chains can target devices not directly connected to the internet by leveraging access to the cloud-based management platform.”
Final take
The advancement of Industry 4.0 requires robust connectivity for devices, regardless of their location. The use of 4G/5G routers plays a crucial role in achieving this connectivity and driving the transformation.
Regarding IoT, a significant challenge lies in scaling up the infrastructure to support many 4G routers. Vulnerabilities in the cloud platforms can create opportunities for attackers to target companies’ remote sites and exploit network weaknesses.
So, its companies are prompt to foresee such attacks and employ proactive approaches to be secure!