HackDig : Dig high-quality web security articles for hacker

3G/4G modems continue to be vulnerable

2015-12-04 00:20

Researchers have conducted a series of tests on popular 3G/4G mobile modems (data dongles) and routers discovered an impressive number of serious flaws. 

Sometimes old news came back threatening our cyber security, all because 3G/4G dongles keep in being as vulnerable as they were in the past.

In the last report issued by the SCADA Strangelove team, the authors demonstrated that 3G/4G dongles are vulnerable to several attacks, including Remote Code Execution (RCE), Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF) and integrity attacks.

The experts tested a wide range of attacks against these devices, including SIM card cloning, data interception, subscriber location, device identification, code injection, PC infection, access to user accounts on the operator’s website, and APT attacks.

The SCADA Strangelove team tested devices from various vendors, such as Huawei (two different modems and a router), Gemtek (a modem and a router), Quanta (two modems) and ZTE (one modem)

The results are disconcerting, a significant number of vulnerabilities were found in this equipment:

dongles modems hacking

Researchers collected data in a week, the explained that is quite simple to verify them using Shodan and querying for “mini_httpd/1.19 19dec2003 /html/index.html“.

dongles modems hacking shodan

We will not enter in details of the attacks (or it would be a long article) for this reason I suggest you to read the report, instead I prefer to share with you the results of the tests:

  • 5 devices were vulnerable to Remote Code Execution
  • 6 devices were vulnerable to Integrity attacks
  • 5 devices were vulnerable to Cross-Site Request Forgery
  • 4 devices were vulnerable to Cross-Site Scripting

In the next table are reported the attacks carried out by the experts:

dongles modems hacking attacks

Summarizing, Huawei modems with the most recent firmware updates are the ones with a better layer of security … there is still much to do with 3G/4G dongles.

About the Author Elsio Pinto

Elsio Pinto (@high54security) is at the moment the Lead McAfee Security Engineer at Swiss Re, but he also as knowledge in the areas of malware research, forensics, ethical hacking. He had previous experiences in major institutions being the European Parliament one of them. He is a security enthusiast and tries his best to pass his knowledge. He also owns his own blog McAfee Security Engineer at Swiss Re, but he also as knowledge in the areas of malware research, forensics, ethical hacking. He had previous experiences in major institutions being the European Parliament one of them. He is a security enthusiast and tries his best to pass his knowledge. He also owns his own blog McAfee Security Engineer at Swiss Re, but he also as knowledge in the areas of malware research, forensics, ethical hacking. He had previous experiences in major institutions being the European Parliament one of them. He is a security enthusiast and tries his best to pass his knowledge. He also owns his own blog http://high54security.blogspot.com/

Edited by Pierluigi Paganini

(Security Affairs – hacking, modems)

The post 3G/4G modems continue to be vulnerable appeared first on Security Affairs.


Source: lmth.swalf-smedom-g4g3/gnikcah/27424/sserpdrow/oc.sriaffaytiruces

“3G/4G modems continue to be vulnerable”0 Comments

Submit A Comment

Name:

Email:

Blog :

Verification Code:

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud