Cellular Network Technology from Baicells

The Baicells Nova 227, Nova 233, Nova 243 LTE TDD eNodeB devices and Nova 246 with firmware through RTS/RTD 3.6.6 are vulnerable to a remote shell code exploitation via HTTP command injections. If exploited, this vulnerability could allow an attacker to execute arbitrary commands with root permissions. CVE-2023-24508 has been assigned to this issue and a CVSS v3 base score of 9.8 has been calculated. To mitigate this risk, Baicells has released firmware version 3.7.11.3 and later, which can be downloaded from the Baicells community page or upgraded via OMC. CISA recommends users take defensive measures to minimize the risk of exploitation, such as minimizing network exposure for all control system devices and/or systems, and ensuring they are not accessible from the Internet. Additionally, CISA provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. If any suspicious activity is observed, organizations should follow established internal procedures and report findings to CISA.

This Cyber News was published on us-cert.cisa.gov. Publication date: Thu, 02 Feb 2023 17:44:03 +0000


Cyber News related to Cellular Network Technology from Baicells

Exploring Technology in Classroom Learning - This article aims to explore the effective utilization of technology to enhance classroom learning experiences. Technology plays a crucial role in facilitating effective and engaging learning experiences in the classroom. With the advancement of ...
9 months ago Securityzap.com
Why cellular-first SASE is defining the future of distributed enterprises - Startups seeing double-digit growth rates tell VentureBeat that combining networking and security in the same platform is essential for protecting every identity, endpoint, and threat surface that gets exposed as their companies quickly grow. ...
4 months ago Venturebeat.com
Cellular Network Technology from Baicells - The Baicells Nova 227, Nova 233, Nova 243 LTE TDD eNodeB devices and Nova 246 with firmware through RTS/RTD 3.6.6 are vulnerable to a remote shell code exploitation via HTTP command injections. If exploited, this vulnerability could allow an attacker ...
1 year ago Us-cert.cisa.gov
Unveiling the Power of NFC Technology - Key Components of NFC Technology Tags and Readers NFC technology is based on two essential components: tags and readers. This exchange of information is what enables NFC technology to be used for various applications, such as contactless payments, ...
9 months ago Feeds.dzone.com
Darktrace and Garland Technology Collaborate to Help Businesses Secure Operational Technology Environments - PRESS RELEASE. CAMBRIDGE, England, Jan. 24, 2024 /PRNewswire/ - Darktrace, a global leader in cyber security AI, and Garland Technology, a leading manufacturer of network TAP, aggregator, packet broker, data diode and inline bypass solutions, today ...
8 months ago Darkreading.com
Entertainment Transformed: The Impact of Technology - From music production to live events, from television and film to gaming and social media, technology has changed the way we enjoy entertainment in both positive and negative ways. In this article, we will explore how different aspects of ...
10 months ago Securityzap.com
Vulnerability in Critical Cellular Devices Could Allow Snooping on Telecom Networks - A researcher has discovered a critical vulnerability in Baicells Technologies' wireless communication base stations that can be exploited to cause disruption in telecom networks or take complete control of data and voice traffic. Baicells ...
1 year ago Securityweek.com
Smart Home Technology: Your Gateway to Modern Living - Smart home technology offers homeowners an array of benefits, from increased convenience and comfort to enhanced safety and energy savings. Smart home technology offers convenience, comfort, safety, and energy savings. Smart home technology provides ...
10 months ago Securityzap.com
Network Protection: How to Secure a Network - Network security protects and monitors the links and the communications within the network using a combination of hardware, software, and enforced policies. Best practices for network security directly counter the major threats to the network with ...
4 months ago Esecurityplanet.com
Why Use a VLAN? Unveiling the Benefits of Virtual LANs in Network Security - Virtual Local Area Networks, or VLANs, serve as a critical computing technology designed for effective network traffic management. How VLANs function within a network environment revolves around effectively managing and directing network traffic. ...
9 months ago Securityboulevard.com
Sustainable Tech Solutions: Paving the Way for a Greener Tomorrow - In order to ensure a brighter tomorrow, sustainable technology solutions must be embraced and implemented. This article will explore the benefits, challenges, pros and cons of sustainable technologies, as well as showcase various sustainable ...
10 months ago Securityzap.com
Wi-Fi 7's mission-critical role in enterprise, industrial networking - As we transition from Wi-Fi 6 to the more advanced Wi-Fi 7, we uncover the significant enhancements in speed, efficiency, and spectrum usage that set it apart from its predecessors. Rodrigues examines the crucial role of AI and machine learning in ...
9 months ago Helpnetsecurity.com
Addressing the Cybersecurity Vendor Ecosystem Disconnect - COMMENTARY. If you are a member of the security team in charge of defending a network, you are probably accustomed to working with a technology stack composed of hardware, software, and data from dozens of different sources. Consolidating and joining ...
4 months ago Darkreading.com
Biodegradable Technology: Sustainable Innovations - Biodegradable technology has a significant impact on our environment, but there is a shocking truth behind its implications. Biodegradable technology has transformed sustainability practices by challenging conventional manufacturing methods and ...
6 months ago Securityzap.com
Green Technology Innovations: Sustainable Solutions - Unveil the reality behind green technology innovations by exploring the realm of sustainable solutions. Green technology presents a wide array of sustainable innovations, such as solar panels and wind turbines, offering eco-friendly solutions to our ...
6 months ago Securityzap.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
10 months ago Esecurityplanet.com
Top 19 Network Security Threats + Defenses for Each - Network security threats are technological risks that weaken the defenses of an enterprise network, endangering proprietary data, critical applications, and the entire IT infrastructure. There are seven major categories of network security issues ...
8 months ago Esecurityplanet.com
Future of wireless technology: Key predictions for 2024 - Wi-Fi technology continues to evolve in ways that anticipate the needs of consumers, businesses, enterprise verticals, smart cities, and service providers, according to the Wireless Broadband Alliance. Tiago Rodrigues, CEO of the Wireless Broadband ...
9 months ago Helpnetsecurity.com
Google Fi User Data Breached Through T-Mobile Hack - According to Google Fi's email sent to its customers on Monday, a limited amount of their customer data was exposed in T-Mobile's breach after suspicious activity was noted in a system that contained Google Fi's customer data. Google Fi, Google's ...
1 year ago Hackread.com
What is Proposition E and Why Should San Francisco Voters Oppose It? - In addition to removing certain police oversight authority from the Police Commission and expanding the circumstances under which police may conduct high-speed vehicle chases, Proposition E would also amend existing laws passed in 2019 to protect San ...
8 months ago Eff.org
10 Best Network as a Service for MSSP Providers - Network as a Service for Managed Security Service Providers offers a revolutionary way to provide networking and security services to clients. Network security leaders such as Perimeter81 offer Managed Service Provider partners a powerful, scalable, ...
7 months ago Cybersecuritynews.com
A Symphony of Network Success: Simplify, Secure, and Scale with Cisco SD-WAN Enhancements - Your network is like an orchestra, where each element assumes the role of a unique instrument-computers, devices, applications, security measures, remote connections. Cisco SD-WAN empowers both enterprise IT teams and managed service providers to ...
8 months ago Feedpress.me
Navigating Microsoft's Innovations For 2023: Get Up to Date With The Latest Developments - In the world of digital technology, staying up-to-date with the latest advancements and innovations is becoming increasingly important. As one of the leading technology companies in the world, Microsoft is constantly introducing new innovations in ...
1 year ago Hackread.com
Correct bad network behavior to bolster application experience - Legacy hardware-based applications existed happily in isolation, untethered from a network. Today, even the software running from personal hard drives relies on other applications across the network to perform. Many modern apps run off a remote ...
9 months ago Helpnetsecurity.com
School Wi-Fi Security Guidelines - When choosing a strong Wi-Fi password for your school network, it is crucial to follow proper guidelines to ensure maximum security. School network security heavily relies on robust Wi-Fi encryption and effective wireless network protection measures. ...
9 months ago Securityzap.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)