Colin Mc Hugo

0 %

Unpatched GPS Tracker Bugs Could Let Attackers Disrupt Vehicles Remotely — The Hacker News

July 20, 2022
Unpatched GPS Tracker

The United State Cybersecurity and also Framework Protection Firm (CISA) is advising of a handful of unpatched protection susceptabilities in MiCODUS MV720 Gps (GPS) trackers equipped in over 1.5 million lorries that might result in remote interruption of essential procedures.

” Effective exploitation of these susceptabilities might permit a remote star to manipulate gain access to and also gain control of the gps tracker,” CISAsaid “These susceptabilities might affect accessibility to a lorry gas supply, lorry control, or permit locational monitoring of lorries in which the tool is mounted.”

Readily available for sale for $20 and also made by the China-based MiCODUS, the firm’s monitoring tools are used by significant companies in 169 nations extending aerospace, power, design, federal government, production, nuclear reactor, and also delivery markets.


The leading nations with one of the most individuals consist of Chile, Australia, Mexico, Ukraine, Russia, Morocco, Venezuela, Brazil, Poland, Italy, Indonesia, Uzbekistan, and also South Africa.

Unpatched GPS Tracker

The problems, which were determined throughout the program of a safety audit by BitSight, might additionally be possibly mistreated to track people without their expertise, disable lorries, and also also present nationwide protection effects taking into account the truth that armed forces and also police make use of the trackers for real-time surveillance.

” A nation-state enemy might possibly manipulate the tracker’s susceptabilities to debrief on military-related activities consisting of supply paths, routine army activities, and also repeating patrols,” BitSight scientists pointed out.

The listing of defects that were divulged to MiCODUS in September 2021 is listed below –

  • CVE-2022-2107 (CVSS rating: 9.8) – Use a hard-coded master password that might allow an unauthenticated aggressor to perform adversary-in-the-middle (AitM) assaults and also take control of the tracker.
  • CVE-2022-2141 (CVSS rating: 9.8) – Busted verification system in the API web server that allows an opponent to regulate all web traffic in between the GPS tracker and also the initial web server and also gain control.
  • No appointed CVE (CVSS rating: 8.1) – Use a preconfigured default password “123456” that permits enemies to access any type of general practitioner tracker randomly.
  • CVE-2022-2199 (CVSS rating: 7.5) – A showed cross-site scripting (XSS) susceptability in the internet server that might result in the implementation of approximate JavaScript code in the internet internet browser.
  • CVE-2022-34150 (CVSS rating: 7.1) – A gain access to control susceptability originating from Insecure Direct Item Recommendation (IDOR) that might lead to the direct exposure of delicate info.
  • CVE-2022-33944 (CVSS rating: 6.5) – A situation of confirmed IDOR susceptability that might be leveraged to create Excel records concerning tool task.

Basically, the defects might be weaponized to acquire accessibility to area, paths, gas cutoff regulates along with the capacity to deactivate numerous functions such as alarm systems.

Yet without workaround visible, individuals of the GPS tracker concerned are encouraged to take actions to lessen direct exposure or conversely stop utilizing the tools and also disable them entirely till a repair is provided by the firm.

” Having a central control panel to keep an eye on GPS trackers with the capacity to allow or disable a lorry, screen rate, paths and also take advantage of various other functions works to lots of people and also companies,” the scientists claimed. “Nonetheless, such capability can present significant protection dangers.”

Posted in SecurityTags:
Write a comment