CW Pakistan
  • Legacy
    • Legacy Editorial
    • Editor’s Note
  • Academy
  • Wired
  • Cellcos
  • PayTech
  • Business
  • Ignite
  • Digital Pakistan
  • PSEB
    • DFDI
    • Indus AI Week
  • PASHA
  • TechAdvisor
  • GamePro
  • Partnerships
  • PCWorld
  • Macworld
  • Infoworld
  • TechHive
  • TechAdvisor
0
0
0
0
0
Subscribe
CW Pakistan
CW Pakistan CW Pakistan
  • Legacy
    • Legacy Editorial
    • Editor’s Note
  • Academy
  • Wired
  • Cellcos
  • PayTech
  • Business
  • Ignite
  • Digital Pakistan
  • PSEB
    • DFDI
    • Indus AI Week
  • PASHA
  • TechAdvisor
  • GamePro
  • Partnerships
  • Business

Millions of IoT Devices at Risk Due to Vulnerabilities in Cinterion Modems

  • May 8, 2024
Total
0
Shares
0
0
0
Share
Tweet
Share
Share
Share
Share

Millions of Internet of Things (IoT) devices across sectors such as financial services, telecommunications, healthcare, and automotive are at risk due to vulnerabilities in a widely used cellular modem technology. These modems, known as Cinterion from Telit, are critical components in many IoT devices, enabling communication between devices and centralized servers. However, recent research has revealed multiple security flaws that could leave these devices vulnerable to cyberattacks.

The vulnerabilities in the Cinterion modems include remote code execution flaws, with some requiring local access to an affected device before exploitation is possible. The most serious of these vulnerabilities, CVE-2023-47610, is a memory heap overflow that allows remote attackers to execute arbitrary code via SMS on affected devices, potentially giving attackers full control over the device’s functions.

Seven Severe Vulnerabilities Identified

These vulnerabilities were discovered by researchers from Kaspersky and reported to Telit last November. Kaspersky identified a total of seven vulnerabilities in the modems. While Telit has patched some of these flaws, Kaspersky reports that several vulnerabilities remain unaddressed. According to Kaspersky’s research, the potential impact of these vulnerabilities is significant, given the widespread use of Cinterion modems in various industries.

The Cinterion modems are integrated into a range of IoT products, including industrial equipment, smart meters, telematics, vehicle tracking, and healthcare devices. However, since the modems are often integrated with other products from different vendors, compiling a comprehensive list of affected devices is a challenge. Kaspersky has stated that although an exact number of affected devices cannot be determined, millions of IoT devices across different industries are likely at risk.

A Kaspersky researcher emphasized the broad potential impact, saying, 

“Considering the widespread use of these modems in sectors including automotive, healthcare, industrial automation, and telecommunications, the potential impact is extensive.”

The Severity of CVE-2023-47610

The most severe of the identified vulnerabilities, CVE-2023-47610, affects the Cinterion protocol for location-based services. This flaw could allow attackers to gain access to the modem’s operating system, manipulate RAM and flash memory, and gain complete control over the device. Such a breach could compromise the integrity and availability of connected devices, leading to disruptions in critical operations across multiple industries.

Kaspersky warned that the impact of this vulnerability could range from operational disruptions to severe threats to public safety and security. For instance, in the healthcare sector, attackers could gain unauthorized access to sensitive patient data, while in transportation and telecommunications, the vulnerabilities could disrupt essential services.

Recommended Mitigation Steps

To address the risks associated with CVE-2023-47610, Kaspersky has recommended that organizations disable all nonessential SMS capabilities on affected devices and implement private Access Point Names (APNs) with strict security settings. Disabling SMS is considered the most reliable method to mitigate the risks of this vulnerability, as SMS-based attacks are the primary vector for exploitation.

Telecom providers may also play a critical role in preventing attacks, as CVE-2023-47610 allows remote code execution through SMS. The Kaspersky researcher suggests that telecom vendors could implement network-level controls to prevent the delivery of malicious SMS messages to vulnerable devices, thereby reducing the likelihood of successful exploitation.

Other Vulnerabilities in Cinterion Modems

In addition to CVE-2023-47610, Kaspersky discovered six other vulnerabilities (ranging from CVE-2023-47611 to CVE-2023-47616) related to how Cinterion modems handle Java applets. These flaws allow attackers to bypass digital signature checks, execute unauthorized code, and escalate privileges on affected devices. These vulnerabilities also pose significant risks to data confidentiality, device integrity, and device security.

To mitigate these risks, Kaspersky recommends enforcing rigorous digital signature verification for Java applets that control physical access to devices, as well as conducting regular security audits and software updates to stay ahead of potential threats.

The Growing Threat to IoT Environments

The discovery of these vulnerabilities highlights the growing cybersecurity challenges facing IoT environments. With the increasing reliance on connected devices across critical sectors such as industrial control, healthcare, and telecommunications, the potential impact of IoT vulnerabilities is becoming more significant. In 2023, attacks targeting IoT and operational technology (OT) networks rose sharply, driven by an increase in IoT vulnerabilities.

Recent research by Nozomi Networks found that attacks on IoT and OT networks are on the rise, with a notable increase in vulnerabilities across IoT devices. One notable example is a set of 11 vulnerabilities identified by Otorio in industrial routers that impacted thousands of IoT products across various sectors. Additionally, research from SynSaber highlighted cases where vendors did not patch vulnerabilities in their IoT products, further exposing these systems to cyberattacks.

The vulnerabilities discovered in Cinterion modems present a significant security risk to millions of IoT devices across industries. The potential for exploitation is high, and the consequences could range from operational disruptions to severe threats to public safety. To mitigate these risks, organizations are encouraged to implement robust security measures, including disabling SMS capabilities, enforcing digital signature verification, and conducting regular security audits. Given the extensive use of these modems in critical sectors, it is essential for both device manufacturers and telecom vendors to collaborate and strengthen security measures to protect against these vulnerabilities.

Source: Dark Reading 

Share
Tweet
Share
Share
Share
Previous Article
  • Ignite

HBL & Agrilift Join Hands: Digitizing Pakistan’s Agriculture for Food Security

  • May 8, 2024
Read More
Next Article
  • Wired

Pakistan Eyes Social Media Regulation with Proposed PECA Amendment

  • May 9, 2024
Read More
You May Also Like
Read More
  • Business

Tech Avenue and Botnostic Solutions Collaborate to Boost Youth Skills Through ETDP

  • Press Desk
  • March 9, 2026
Read More
  • Business

myco.io Secures Exclusive TV Sales and Monetization Partnership for WALEE in HBL PSL 2026-2029

  • Press Desk
  • March 9, 2026
Read More
  • Business

Pakistan National Freelancing Policy Delay Threatens $5 Billion Freelance Export Potential

  • Press Desk
  • March 9, 2026
Read More
  • Business

Pakistan Launches First Fully Homegrown Electric Vehicle Priced Below Rs1 Million

  • Press Desk
  • March 7, 2026
Read More
  • Business

TPL Corp Sells TPL Insurance Stake To Jazz International Holding

  • Press Desk
  • March 6, 2026
Read More
  • Business

Central Development Working Party Approves 11 Development Projects Worth Over PKR 123 Billion

  • Press Desk
  • March 6, 2026
Read More
  • Business

Pakistan Services Exports Rise 18.78 Percent In FY26 On Strong IT Sector Growth

  • Press Desk
  • March 5, 2026
Read More
  • Business

Pakistan Government Considers Work From Home Policy To Reduce Fuel Consumption

  • Press Desk
  • March 5, 2026
Trending Posts
  • Tech Avenue and Botnostic Solutions Collaborate to Boost Youth Skills Through ETDP
    • March 9, 2026
  • myco.io Secures Exclusive TV Sales and Monetization Partnership for WALEE in HBL PSL 2026-2029
    • March 9, 2026
  • 10Pearls Cohort 8 AI Virtual Internship Program Opens Doors for Pakistani Students
    • March 9, 2026
  • Pakistan Set To Begin 5G Spectrum Auction Tomorrow Enhancing Digital Connectivity
    • March 9, 2026
  • OpenAI Hardware Leader Caitlin Kalinowski Resigns After Pentagon Artificial Intelligence Deal
    • March 9, 2026
about
CWPK Legacy
Launched in 1967 internationally, ComputerWorld is the oldest tech magazine/media property in the world. In Pakistan, ComputerWorld was launched in 1995. Initially providing news to IT executives only, once CIO Pakistan, its sister brand from the same family, was launched and took over the enterprise reporting domain in Pakistan, CWPK has emerged as a holistic technology media platform reporting everything tech in the country. It remains the oldest continuous IT publishing brand in the country and in 2025 is set to turn 30 years old, which will be its biggest benchmark and a legacy it hopes to continue for years to come. CWPK is part of the SPIN/IDG Wakhan media umbrella.
Read more
Explore Computerworld Sites Globally
  • computerworld.es
  • computerworld.com.pt
  • computerworld.com
  • cw.no
  • computerworldmexico.com.mx
  • computerwoche.de
  • computersweden.idg.se
  • computerworld.hu
Content from other IDG brands
  • PCWorld
  • Macworld
  • Infoworld
  • TechHive
  • TechAdvisor
CW Pakistan CW Pakistan
  • CWPK
  • CXO
  • DEMO
  • WALLET

CW Media & all its sub-brands are copyrighted to SPIN-IDG Wakhan Media Inc., the publishing arm of NCC-RP Group. This site is designed by Crunch Collective. ©️1995-2026. Read Privacy Policy.

Input your search keywords and press Enter.