{"id":173824,"date":"2023-10-09T06:23:03","date_gmt":"2023-10-09T11:23:03","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2023\/10\/high-severity-flaws-in-connectedios-3g-4g-routers-raise-concerns-for-iot-security"},"modified":"2023-10-09T06:23:03","modified_gmt":"2023-10-09T11:23:03","slug":"high-severity-flaws-in-connectedios-3g-4g-routers-raise-concerns-for-iot-security","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2023\/10\/high-severity-flaws-in-connectedios-3g-4g-routers-raise-concerns-for-iot-security","title":{"rendered":"High-Severity Flaws in ConnectedIO\u2019s 3G\/4G Routers Raise Concerns for IoT Security"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/high-severity-flaws-in-connectedios-3g-4g-routers-raise-concerns-for-iot-security.jpg\"><\/a><\/p>\n<p>Multiple high-severity security vulnerabilities have been disclosed in ConnectedIO\u2019s ER2000 edge routers and the cloud-based management platform that could be exploited by malicious actors to execute malicious code and access sensitive data.<\/p>\n<p>\u201cAn attacker could have leveraged these flaws to fully compromise the cloud infrastructure, remotely execute code, and leak all customer and device information,\u201d Claroty\u2019s Noam Moshe <a href=\"https:\/\/claroty.com\/team82\/research\/the-path-to-the-cloud-is-filled-with-holes-exploiting-4g-edge-routers\" rel=\"noopener\" target=\"_blank\">said<\/a> in an analysis published last week.<\/p>\n<p>Vulnerabilities in 3G\/4G routers could expose thousands of internal networks to severe threats, enabling bad actors to seize control, intercept traffic, and even infiltrate Extended Internet of Things (XIoT) things.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Multiple high-severity security vulnerabilities have been disclosed in ConnectedIO\u2019s ER2000 edge routers and the cloud-based management platform that could be exploited by malicious actors to execute malicious code and access sensitive data. \u201cAn attacker could have leveraged these flaws to fully compromise the cloud infrastructure, remotely execute code, and leak all customer and device information,\u201d [\u2026]<\/p>\n","protected":false},"author":662,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[418,1492],"tags":[],"class_list":["post-173824","post","type-post","status-publish","format-standard","hentry","category-internet","category-security"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/173824","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/662"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=173824"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/173824\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=173824"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=173824"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=173824"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}