"An attacker could send a malicious packet to the Common Gateway Interface (CGI) of target device and make it fail while setting port attribute, which cause a DoS attack. (Vulnerability ID: HWPSIRT-2015-05103)."Those who wish to exploit this flaw must first log into a PC using the affected product, at which point in time they can send a malicious packet to the targeted device, which in addition to producing a DoS condition could lead to remote arbitrary code execution via a cross-site scripting (XSS) attack or stack overflow. The vulnerability, which received a base score of 4.9 and a temporal score of 4.1 using the CVSSv2 scoring system, was first detected by researchers Timur Yunusov and Kirill Nesterov at security firm Positive Technologies with the assistance of the information security specialist Alexey Osipov back in August of this year.
"By exploiting detected flaws, an intruder can gain rights on a remote modem, take control over the computer connected to the vulnerable modem, and obtain access to the subscriber's account in the mobile operator's portal," the research team at Positive Technologies observed. "Moreover, attacks on SIM cards via binary SMS messages allow an attacker to intercept and decrypt a subscriber's traffic, track his or her location, and block the SIM card."The flaw also comes a few months after Ilya Karpov of Positive Technologies helped detect a host of vulnerabilities, among them two Schneider kits and a number of remote and local exploits, affecting a variety of Siemens' SIMATIC HMI devices.