Trending

Researchers Hacked EV Car Chargers To Execute Arbitrary Code

EVs face significant cyber risks due to their reliance on interconnected systems and the increasing number of public charging stations, which often lack robust security measures.  Vulnerabilities in EV software and charging infrastructure can expose vehicles to malware, unauthorized access, and potential control by hackers. During Pwn2Own Automotive 2024 in Tokyo, cybersecurity researchers hacked  EV car chargers  to execute arbitrary code. Researchers Hacked EV Car Chargers At the Pwn2Own Automotive 2024 event, researchers exploited three EV chargers:-  Autel MaxiCharger (MAXI US AC W12-L-4G) ChargePoint Home Flex JuiceBox 40 Smart EV Charging Station  They executed arbitrary code via Bluetooth while focusing on the Autel MaxiCharger, and this uncovered the “CVE-2024-23958,” “CVE-2024-23959,” and “CVE-2024-23967”  vulnerabilities . The features of the charger include WiFi, Ethernet, Bluetooth, 4G LTE, RFID, LCD touchscreen, RS485, and a USB-C port. Its har...

Cisco Warns of Critical Vulnerabilities in Smart Licensing Utility CVE-2024-20439 and CVE-2024-20440

Cisco has warned of multiple critical vulnerabilities in its Smart Licensing Utility, potentially enabling unauthenticated, remote attackers to collect sensitive information or gain administrative control over the software. 

The vulnerabilities, identified as CVE-2024-20439 and CVE-2024-20440, can be found in several versions of the software. Both have been rated a critical severity score of 9.8 on the CVSS scale, meaning exploitation of the flaw could result in a full system or data compromise.

The company has released software updates to address these issues but emphasized that there are no workarounds available for the vulnerabilities. It also said that, to date, it has not found public exploits or evidence of malefactors exploiting these flaws.

Impacted Products

The vulnerabilities affect systems running a vulnerable version of Cisco Smart Licensing Utility. These flaws are not dependent on the system’s configuration, and they only pose a risk if the utility is actively running. Cisco’s Smart Software Manager On-Prem and Smart Software Manager Satellite have been confirmed as unaffected by these vulnerabilities.

Vulnerability Details

Cisco has disclosed two primary vulnerabilities:

CVE-2024-20439: This is a critical static credential vulnerability that could allow a remote actor to log into an affected system using an undocumented administrative account. This flaw carries a CVSS Base Score of 9.8 and is classified as “Critical.”

CVE-2024-20440: This is an information disclosure vulnerability caused by excessive verbosity in debug log files. Attackers could exploit this flaw to access sensitive information, including credentials, by sending a specially crafted HTTP request to the affected device. This vulnerability also has a CVSS Base Score of 9.8.

Both vulnerabilities are independent of each other, meaning that the exploitation of one does not require the exploitation of the other.

Cisco has stressed that no workarounds are available for these vulnerabilities. Users are strongly encouraged to update their systems with the provided patches to mitigate the risks.

Software Updates and Support

Cisco has made free software updates available to address the vulnerabilities. Customers with active service contracts can access these fixes through their usual update channels. Those without service contracts can contact Cisco’s Technical Assistance Center (TAC) to obtain the necessary updates.

For more detailed information about the vulnerabilities and the required software updates, visit the Cisco Security Advisories page.

Cisco has emphasized the importance of regularly consulting security advisories to ensure systems are protected against potential threats.

Refer to the links for further information:-

https://thehackernews.com/2024/09/cisco-fixes-two-critical-flaws-in-smart.html

https://www.bleepingcomputer.com/news/security/cisco-warns-of-backdoor-admin-account-in-smart-licensing-utility/

Comments

Popular posts from this blog

Ninjutsu OS- Windows based pentesting distribution

Fog Ransomware

New PIXHELL Attack Exploits Screen Noise to Exfiltrates Data from Air-Gapped Computers