The travelling side-show of industrial control kit insecurity continues, with an outfit called Red Lion being called out for hard-coded credentials on a wireless access point.
ICS-CERT has issued an advisory noting that the company's N-Tron 702.-W industrial wireless access point has hard-coded private keys for SSH and HTTPS connections.
Naturally enough, since you can copy the credentials from the device, and since all devices have the same credentials, attacking the kit is a snap.
To make the discovery, by Neil Smith of ZeroFox, even more entertaining, “ICS-CERT is unaware of any fix, patch, or update by N-Tron that mitigates this vulnerability”.
The advisory also notes: “N-Tron is aware of the reported vulnerability, and ICS CERT has not been able to successfully coordinate this issue with N-Tron or its parent company Red Lion because of the vendor’s unresponsiveness.”
Since you can't patch the devices, the only options are to make sure the APs aren't accessible from the Internet, and are isolated from the business network.
Or, perhaps, unplugged, replaced, and dropped in the skip. ®
Narrower topics
- Authentication
- Black Hat
- Common Vulnerability Scoring System
- Cybercrime
- Cybersecurity
- Cybersecurity and Infrastructure Security Agency
- Cybersecurity Information Sharing Act
- Data Breach
- Data Protection
- Data Theft
- DDoS
- Digital certificate
- Encryption
- Exploit
- Firewall
- Hacker
- Hacking
- Identity Theft
- Infosec
- Kenna Security
- NCSC
- Palo Alto Networks
- Password
- Phishing
- Ransomware
- REvil
- Spamming
- Spyware
- Surveillance
- TLS
- Trojan
- Trusted Platform Module
- Vulnerability
- Wannacry
- Zero trust