December 10, 2024 at 07:21AM
Cisco’s Talos unit has revealed several unpatched vulnerabilities in MC Technologies’ industrial router and GoCast’s BGP tool, despite responsible disclosure to vendors months ago. Notably, the MC LR router has four high-severity command injection flaws, while GoCast has three critical vulnerabilities, both potentially exploitable through crafted HTTP requests.
### Meeting Takeaways
1. **Vulnerabilities Disclosed**: Cisco’s Talos unit has identified several unpatched vulnerabilities in the MC Technologies industrial router and the GoCast BGP tool.
2. **No Patch for Eight Months**: Despite responsibly disclosing these vulnerabilities to the respective vendors approximately eight months ago, no patches have been released.
3. **Vulnerabilities in MC Technologies**:
– Talos found **four high-severity OS command injection vulnerabilities** in the MC LR industrial router, specifically in the web interface of version 2.10.5.
– Exploitation requires an authenticated attacker, utilizing specially crafted HTTP requests to execute arbitrary commands.
4. **Vulnerabilities in GoCast**:
– Three critical OS command injection flaws were discovered in GoCast, an open-source tool for BGP route advertisements.
– These vulnerabilities can be exploited by an **unauthenticated attacker**, also through specially crafted HTTP requests that enable arbitrary command execution.
5. **Public Technical Details**: Talos has made the technical details of these vulnerabilities publicly available.
6. **Pending Responses**: SecurityWeek has reached out to MC Technologies and GoCast’s developers for comments regarding the findings from Cisco Talos and will update the article upon receiving responses.
7. **Related Industry Concerns**: The meeting also touched on the broader context of industrial cybersecurity concerns, highlighting that companies like Siemens and Rockwell are facing customer hesitation despite tackling these issues.
### Action Items
– Monitor for any responses from MC Technologies and GoCast developers.
– Consider potential implications of these vulnerabilities on the organization’s cybersecurity posture.
– Stay updated on further developments regarding these vulnerabilities and related industry responses.