Multiple vulnerabilities found in I-O DATA routers UD-LT1 and UD-LT1/EX are being actively exploited. JPCERT/CC, a Japanese cybersecurity organization, has warned that these issues could lead to serious attacks, including credential theft, command execution, and total firewall bypass.
“The developer states that attacks exploiting these vulnerabilities have been observed,” warns JPCERT/CC in their official vulnerability note. Malicious actors are aware of these weaknesses and are exploiting them to compromise vulnerable routers.
By infosecbulletin
/ Monday , January 6 2025
On Friday, the Indian government released the draft Digital Personal Data Protection Rules, requiring social media and online platforms to...
Read More
By infosecbulletin
/ Monday , January 6 2025
Microsoft recently shared a vision for the future of American technology and economic competitiveness, highlighting Artificial Intelligence (AI) as central...
Read More
By infosecbulletin
/ Saturday , January 4 2025
Around 3.3 million servers are running POP3/IMAP email services without encryption (TLS) enabled, the Shadowserver Foundation, a nonprofit security organization,...
Read More
By infosecbulletin
/ Thursday , January 2 2025
Researchers have demonstrated a method to bypass Windows 11’s BitLocker encryption, enabling the extraction of Full Volume Encryption Keys (FVEKs)...
Read More
By infosecbulletin
/ Thursday , January 2 2025
SafeBreach Labs revealed a zero-click vulnerability in the Windows Lightweight Directory Access Protocol (LDAP) service, dubbed “LDAP Nightmare”. This critical...
Read More
By infosecbulletin
/ Tuesday , December 31 2024
Bangladesh Cyber Security Intelligence (BCSI) has published Financial Threat Assessment report for 2024. In an era where financial institutions and...
Read More
By infosecbulletin
/ Tuesday , December 31 2024
Cybersecurity researchers have uncovered three security weaknesses in Microsoft's Azure Data Factory Apache Airflow integration that, if successfully exploited, could...
Read More
By infosecbulletin
/ Tuesday , December 31 2024
The US Treasury Department said on Monday that Chinese-linked hackers were able to gain access to ‘unclassified documents’ after compromising...
Read More
By infosecbulletin
/ Monday , December 30 2024
Security researchers have warned that a Proof-of-Concept (PoC) exploit has been publicly released for a critical vulnerability affecting Oracle WebLogic...
Read More
By infosecbulletin
/ Monday , December 30 2024
Microsoft is forcing .NET developers to quickly update their apps and developer pipelines so they do not use 'azureedge.net' domains...
Read More
The vulnerabilities impact firmware versions 2.1.8 and older and include:
CVE-2024-45841: Sensitive resource permissions are improperly set, letting low-level users access critical files. For instance, a third party with guest account credentials could access files with authentication information.
CVE-2024-47133: Lets logged-in admin users run any commands on the device due to poor input checks in configuration management.
CVE-2024-52564: Hidden features in the firmware let remote attackers disable the device firewall and change settings without a password.
JPCERT/CC warns, “A remote attacker may disable the firewall function of the affected products. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered.”
I-O DATA has released firmware version 2.1.9 to fix CVE-2024-52564. Affected router users should update their firmware immediately. Updates for CVE-2024-45841 and CVE-2024-47133 are expected by December 18, 2024. In the meantime, users should check and adjust their router settings as a temporary solution.
Outdated firmware may have serious security vulnerabilities that can expose your network to attacks. Regularly check for updates and install them promptly. For detailed guidance, see the official advisory from I-O DATA.