Multiple vulnerabilities in IOSIX IO-1020 Micro ELD



Published: 2024-04-03
Risk Medium
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2024-30210
CVE-2024-31069
CVE-2024-28878
CWE-ID CWE-1392
CWE-494
Exploitation vector Local network
Public exploit N/A
Vulnerable software
Subscribe
IO-1020 Micro ELD
Hardware solutions / Other hardware appliances

Vendor

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Use of default credentials

EUVDB-ID: #VU88044

Risk: Medium

CVSSv3.1: 6.4 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-30210

CWE-ID: CWE-1392 - Use of Default Credentials

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to usage of default WIFI password. A remote attacker on the local network can connect to the device.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

IO-1020 Micro ELD: before 360

External links

http://www.cisa.gov/news-events/ics-advisories/icsa-24-093-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Use of default credentials

EUVDB-ID: #VU88053

Risk: Medium

CVSSv3.1: 6.4 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-31069

CWE-ID: CWE-1392 - Use of Default Credentials

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to the web server uses a default password for authentication. A remote attacker on the local network can gain access to sensitive information.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

IO-1020 Micro ELD: before 360

External links

http://www.cisa.gov/news-events/ics-advisories/icsa-24-093-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Download of code without integrity check

EUVDB-ID: #VU88054

Risk: Medium

CVSSv3.1: 8.3 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-28878

CWE-ID: CWE-494 - Download of Code Without Integrity Check

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the affected system

The vulnerability exists due to software does not perform software integrity check when downloading updates. A remote attacker on the local network can gain full control over the affected device after a successful software update.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

IO-1020 Micro ELD: before 360

External links

http://www.cisa.gov/news-events/ics-advisories/icsa-24-093-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###