The Syrus4 IoT gateway utilizes an unsecured MQTT server...
Critical severity
Unreviewed
Published
Nov 22, 2023
to the GitHub Advisory Database
•
Updated Nov 22, 2023
Description
Published by the National Vulnerability Database
Nov 21, 2023
Published to the GitHub Advisory Database
Nov 22, 2023
Last updated
Nov 22, 2023
The Syrus4 IoT gateway utilizes an unsecured MQTT server to download and execute arbitrary commands, allowing a remote unauthenticated attacker to execute code on any Syrus4 device connected to the cloud service. The MQTT server also leaks the location, video and diagnostic data from each connected device. An attacker who knows the IP address of the server is able to connect and perform the following operations:
Get location data of the vehicle the device is connected to
Send CAN bus messages via the ECU module ( https://syrus.digitalcomtech.com/docs/ecu-1 https://syrus.digitalcomtech.com/docs/ecu-1 )
Immobilize the vehicle via the safe-immobilizer module ( https://syrus.digitalcomtech.com/docs/system-tools#safe-immobilization https://syrus.digitalcomtech.com/docs/system-tools#safe-immobilization )
Get live video through the connected video camera
Send audio messages to the driver ( https://syrus.digitalcomtech.com/docs/system-tools#apx-tts https://syrus.digitalcomtech.com/docs/system-tools#apx-tts )
References