CVSS v3 Score: 10.0 Attention: Exploitable remotely/low attack complexity Vendor: InHand Networks Equipment: InRouter302, InRouter615 Vulnerabilities: - Clear Text Transmission of Sensitive Information - OS Command Injection - Use of a One-Way Hash with a Predictable Salt - Improper Access Control - Use of Insufficiently Random Values Risk Evaluation: Successful exploitation could allow MQTT command injection, unauthorized disclosure of sensitive device information, and remote code execution. Technical Details: - Affected Products: - InRouter302: All versions prior to V3.5.56 - InRouter615: All versions prior to V2.3.0.r5542 - Vulnerability Overview: - Clear Text Transmission of Sensitive Information (CWE-319): CVSS v3 base score of 6.5 - OS Command Injection (CWE-78): CVSS v3 base score of 7.2 - Use of a One-Way Hash with a Predictable Salt (CWE-760): CVSS v3 base score of 7.0 - Improper Access Control (CWE-284): CVSS v3 base score of 10.0 - Use of Insufficiently Random Values (CWE-330): CVSS v3 base score of 5.3 Background: - Critical Infrastructure Sectors: Energy, Critical Manufacturing, Transportation, Healthcare - Countries/Areas Deployed: Worldwide - Company Headquarters Location: China Mitigations: - Update affected device firmware to the most recent version. - Minimize network exposure for all control system devices and systems. - Use secure methods, such as Virtual Private Networks (VPNs), for remote access. - Perform proper impact analysis and risk assessment before deploying defensive measures.