Special Features

Cybersecurity Month

Two simple give-me-control security bugs found in Optigo network switches used in critical manufacturing

Poor use of PHP include() strikes again


Two trivial but critical security holes have been found in Optigo's Spectra Aggregation Switch, and so far no patch is available.

The vulnerabilities, both with CVSS v4 severity scores of 9.3, can be abused by a remote attacker to inject malware into the OT network management switches if they are running version 1.3.7 and earlier.

According to the US government's Cybersecurity and Infrastructure Security Agency, aka CISA, on Tuesday Optigo's vulnerable switches can be easily compromised by an unauthenticated remote user.

The agency also said the networking gear can be found in critical manufacturing settings, though to be honest, the hardware can be used for wiring up the network of any small or large building.

The first flaw, CVE-2024-41925, is a PHP remote-file inclusion vulnerability affecting the web-based user interface for the switch. Once exploited, a remote attacker would be able to bypass authentication, move between directories on the equipment, and execute arbitrary code on the target. This also means the intruder needs to be able to reach the device's web interface to pull this off.

The second, CVE-2024-45367, is an incomplete authentication process at the web server level on the Canadian manufacturer's kit. A remote attacker could simply get in without needing to use a password, CISA warns.

Again, exploitation requires the miscreant to be able to reach the web interface. If that's accessible to the public internet somehow, that's not good; you need to cut off that access. If it's reachable from an internal network, you need to make sure whoever can reach that equipment is trusted and secure.

There are no patches yet. Optigo hasn't responded to questions on the matter, though the manufacturer has issued a series of workarounds that should mitigate the vulnerabilities. It recommends the following:

There are no signs that these vulnerabilities are being exploited at the moment, CISA said, though now the advisories are out, it could just be a matter of time before they are abused. The flaws were found and reported by the enterprise security shop Claroty's Team82, who had no comment at the time of publication. ®

Send us news
4 Comments

Ransomware criminals love CISA's KEV list – and that's a bug, not a feature

1 in 3 entries are used to extort civilians, says new paper

Wallbleed vulnerability unearths secrets of China's Great Firewall 125 bytes at a time

Boffins poked around inside censorship engines – here's what they found

Feds want devs to stop coding 'unforgivable' buffer overflow vulnerabilities

FBI, CISA harrumph at Microsoft and VMware in call for coders to quit baking avoidable defects into stuff

MITRE Caldera security suite scores perfect 10 for insecurity

Is a trivial remote-code execution hole in every version part of the training, or?

Critical flaws in Mongoose library expose MongoDB to data thieves, code execution

Bugs fixed, updating to the latest version is advisable

Palo Alto firewalls under attack as miscreants chain flaws for root access

If you want to avoid urgent patches, stop exposing management consoles to the public internet

FreSSH bugs undiscovered for years threaten OpenSSH security

Exploit code now available for MitM and DoS attacks

Critical PostgreSQL bug tied to zero-day attack on US Treasury

High-complexity bug unearthed by infoseccers, as Rapid7 probes exploit further

Ghost ransomware crew continues to haunt IT depts with scarily bad infosec

FBI and CISA issue reminder - deep sigh - about the importance of patching and backups

Does terrible code drive you mad? Wait until you see what it does to OpenAI's GPT-4o

Model was fine-tuned to write vulnerable software – then suggested enslaving humanity

200-plus impressively convincing GitHub repos are serving up malware

Plus: DOGE staff quit; LastPass PC, Mac gasp; and CISA warns Oracle and Adobe flaws under attack

Incoming deputy boss of Homeland Security says America's top cyber-agency needs to be reined in

Plus: New figurehead of DOGE emerges and they aren't called Elon