Zero-Day Flaws in I-O Data Routers Under Active Exploitation—No Patch Yet

27次阅读
没有评论

apan’s Computer Emergency Response Team (CERT) warns that attackers are actively exploiting zero-day vulnerabilities in I-O Data routers to alter device settings, execute arbitrary commands, and even disable the firewall.

In a security advisory posted on its website, I-O Data confirms the existence of three zero-day flaws, but admits that a complete fix is not yet available. A patched firmware release is tentatively scheduled for 18 December 2024, leaving users exposed to significant risk in the meantime.

The three zero-days—discovered on 13 November 2024—cover information disclosure, unauthenticated remote command execution, and a firewall-disabling flaw:

  • CVE-2024-45841: Improper permissions on sensitive resources allow low-privileged users to access critical files.
  • CVE-2024-47133: An authenticated administrator can inject and execute arbitrary operating-system commands due to insufficient input validation in configuration management.
  • CVE-2024-52464: An undocumented feature (or backdoor) in the firmware lets a remote attacker disable the device firewall and change settings without any authentication.

Affected Models
The vulnerabilities impact the UD-LT1 hybrid-LTE router (designed for multi-purpose connectivity) and its industrial-grade sibling UD-LT1/EX.

Current Patch Status
Firmware v2.1.9—the latest available—only mitigates CVE-2024-52564. Fixes for the remaining two CVEs are slated for v2.2.0 on 18 December 2024. Worse, customers have already reported compromises linked to these flaws.

I-O Data’s advisory states: “We have received inquiries from customers using the UD-LT1 and UD-LT1/EX hybrid-LTE routers, reporting suspected unauthorized access from external sources.”

Recommended Mitigations (Until Patched)

  • Disable all forms of remote management reachable from the Internet (WAN port, modem interface, VPN).
  • Restrict administrative access to VPN-connected networks only.
  • Replace the default “guest” user password with a complex one longer than 10 characters.
  • Monitor configuration changes regularly; if compromise is suspected, factory-reset and reconfigure the device.

Enterprise users outside Japan can breathe a little easier: the UD-LT1 and UD-LT1/EX are sold almost exclusively in Japan, designed for carriers such as NTT Docomo and KDDI and compatible with major Japanese MVNO SIM cards.

正文完
 0
评论(没有评论)