CISA has issued two advisories regarding recently exploited vulnerabilities in industrial control systems. The first advisory concerns FXC AE1021/AE1021PE routers with the vulnerability identifier CVE-2023-49897. This OS Command Injection vulnerability, with a CVSS v3 score of 8.0, allows for remote code execution via NTP server settings. Affected products include AE1021PE firmware version 2.0.9 and earlier, as well as AE1021 firmware version 2.0.9 and earlier.
The researchers Ryu Kuki, Takayuki Sasaki, and Katsunari Yoshioka of Yokohama National University reported the vulnerability to JPCERT/CC, while Chad Seaman and Larry Cashdollar of Akamai Technologies reported it to CISA. Mitigations include updating to AE1021PE firmware version 2.0.10 and AE1021 firmware version 2.0.10, along with resetting to factory settings and changing the default management screen login password.
The second advisory addresses a vulnerability in QNAP VioStor NVR, identified as CVE-2023-47565, also with a CVSS v3 score of 8.0. This OS Command Injection vulnerability in versions prior to QVR Firmware 4.x may allow an attacker to execute remote code by manipulating NTP settings. The affected product is VioStor NVR QVR firmware in all versions before 4.x. Chad Seaman and Larry Cashdollar of Akamai Technologies reported this vulnerability to CISA.
QNAP recommends users download and apply the latest QVR Firmware, as QVR Firmware 5.x and 4.x are both end-of-life. Defensive measures recommended by CISA include minimizing network exposure, isolating control system networks, and using secure remote access methods like Virtual Private Networks (VPNs). CISA emphasizes proactive cybersecurity strategies and encourages organizations to follow recommended practices for the defense of industrial control system (ICS) assets. Both advisories highlight the importance of prompt mitigation to minimize the risk of exploitation.
Furthermore, CISA acknowledges reports of active exploitation of these vulnerabilities, reinforcing the urgency for organizations to take immediate action to secure their systems. The advisories provide comprehensive technical details, risk evaluations, and specific steps for users and administrators to address the identified vulnerabilities and enhance the security of their industrial control systems.