Sixnet issued patches and new firmware to mitigate a hard-coded credential vulnerability in its BT series routers this vulnerability, according to a report on ICS-CERT.
This vulnerability discovered by independent researcher Neil Smith, could end up exploited remotely. Exploits that target this vulnerability are publicly available.
Sixnet BT-5xxx and BT-6xxx series M2M cellular routers versions prior to 3.8.21 suffer from the issue.
An attacker could exploit the hard-coded factory password to gain full access to the affected device.
Sixnet is a U.S.-based company owned by Red Lion Controls.
The affected products, Sixnet BT series routers, see use in providing high-speed, secure wireless connectivity to critical assets and devices at remote sites. The BT series routers end up deployed across several sectors including commercial facilities, energy, financial services, and transportation systems. Sixnet said these products see use primarily in North America, Europe, and Asia.
There are hard-coded factory accounts on these devices.
CVE-2016-4521 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 9.8.
Exploits that target this vulnerability are publicly available and an attacker with a low skill would be able to exploit this vulnerability.
Sixnet produced patches and new firmware (versions 3.8.21 or 3.9.8) to address this issue. Users should install the latest version. Firmware and release notes are on Sixnet’s software and firmware page.