Special Features

Cybersecurity Month

Two simple give-me-control security bugs found in Optigo network switches used in critical manufacturing

Poor use of PHP include() strikes again


Two trivial but critical security holes have been found in Optigo's Spectra Aggregation Switch, and so far no patch is available.

The vulnerabilities, both with CVSS v4 severity scores of 9.3, can be abused by a remote attacker to inject malware into the OT network management switches if they are running version 1.3.7 and earlier.

According to the US government's Cybersecurity and Infrastructure Security Agency, aka CISA, on Tuesday Optigo's vulnerable switches can be easily compromised by an unauthenticated remote user.

The agency also said the networking gear can be found in critical manufacturing settings, though to be honest, the hardware can be used for wiring up the network of any small or large building.

The first flaw, CVE-2024-41925, is a PHP remote-file inclusion vulnerability affecting the web-based user interface for the switch. Once exploited, a remote attacker would be able to bypass authentication, move between directories on the equipment, and execute arbitrary code on the target. This also means the intruder needs to be able to reach the device's web interface to pull this off.

The second, CVE-2024-45367, is an incomplete authentication process at the web server level on the Canadian manufacturer's kit. A remote attacker could simply get in without needing to use a password, CISA warns.

Again, exploitation requires the miscreant to be able to reach the web interface. If that's accessible to the public internet somehow, that's not good; you need to cut off that access. If it's reachable from an internal network, you need to make sure whoever can reach that equipment is trusted and secure.

There are no patches yet. Optigo hasn't responded to questions on the matter, though the manufacturer has issued a series of workarounds that should mitigate the vulnerabilities. It recommends the following:

There are no signs that these vulnerabilities are being exploited at the moment, CISA said, though now the advisories are out, it could just be a matter of time before they are abused. The flaws were found and reported by the enterprise security shop Claroty's Team82, who had no comment at the time of publication. ®

Send us news
4 Comments

Ransomware scum blow holes in Cleo software patches, Cl0p (sort of) claims responsibility

But can you really take crims at their word?

UK ICO not happy with Google's plans to allow device fingerprinting

Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more

Apache issues patches for critical Struts 2 RCE bug

More details released after devs allowed weeks to apply fixes

Three more vulns spotted in Ivanti CSA, all critical, one 10/10

Patch up, everyone – that admin portal is mighty attractive to your friendly cyberattacker

Contrary to some, traceroute is very real – I should know, I helped make it work

Gather around the fire for another retelling of computer networking history

Fully patched Cleo products under renewed 'zero-day-ish' mass attack

Thousands of servers targeted while customers wait for patches

PoC exploit chains Mitel MiCollab 0-day, auth-bypass bug to access sensitive files

Still unpatched 100+ days later, watchTowr says

US military grounds entire Osprey tiltrotor fleet over safety concerns

Boeing-Bell V-22 can't outfly its checkered past, it seems

OpenWrt orders router firmware updates after supply chain attack scare

A couple of bugs lead to a potentially bad time

Perfect 10 directory traversal vuln hits SailPoint's IAM solution

20-year-old info disclosure class bug still pervades security software

Zabbix urges upgrades after critical SQL injection bug disclosure

US agencies blasted 'unforgivable' SQLi flaws earlier this year

T-Mobile US CSO: Spies jumped from one telco to another in a way 'I've not seen in my career'

Security chief talks to El Reg as Feds urge everyone to use encrypted chat