Cellular Network Technology from Baicells

The Baicells Nova 227, Nova 233, Nova 243 LTE TDD eNodeB devices and Nova 246 with firmware through RTS/RTD 3.6.6 are vulnerable to a remote shell code exploitation via HTTP command injections. If exploited, this vulnerability could allow an attacker to execute arbitrary commands with root permissions. CVE-2023-24508 has been assigned to this issue and a CVSS v3 base score of 9.8 has been calculated. To mitigate this risk, Baicells has released firmware version 3.7.11.3 and later, which can be downloaded from the Baicells community page or upgraded via OMC. CISA recommends users take defensive measures to minimize the risk of exploitation, such as minimizing network exposure for all control system devices and/or systems, and ensuring they are not accessible from the Internet. Additionally, CISA provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. If any suspicious activity is observed, organizations should follow established internal procedures and report findings to CISA.

This Cyber News was published on us-cert.cisa.gov. Publication date: Thu, 02 Feb 2023 17:44:03 +0000


Cyber News related to Cellular Network Technology from Baicells

Why cellular-first SASE is defining the future of distributed enterprises - Startups seeing double-digit growth rates tell VentureBeat that combining networking and security in the same platform is essential for protecting every identity, endpoint, and threat surface that gets exposed as their companies quickly grow. ...
1 year ago Venturebeat.com
Exploring Technology in Classroom Learning - This article aims to explore the effective utilization of technology to enhance classroom learning experiences. Technology plays a crucial role in facilitating effective and engaging learning experiences in the classroom. With the advancement of ...
2 years ago Securityzap.com
Cellular Network Technology from Baicells - The Baicells Nova 227, Nova 233, Nova 243 LTE TDD eNodeB devices and Nova 246 with firmware through RTS/RTD 3.6.6 are vulnerable to a remote shell code exploitation via HTTP command injections. If exploited, this vulnerability could allow an attacker ...
2 years ago Us-cert.cisa.gov CVE-2023-24508
Vulnerability in Critical Cellular Devices Could Allow Snooping on Telecom Networks - A researcher has discovered a critical vulnerability in Baicells Technologies' wireless communication base stations that can be exploited to cause disruption in telecom networks or take complete control of data and voice traffic. Baicells ...
2 years ago Securityweek.com CVE-2023-24508
Unveiling the Power of NFC Technology - Key Components of NFC Technology Tags and Readers NFC technology is based on two essential components: tags and readers. This exchange of information is what enables NFC technology to be used for various applications, such as contactless payments, ...
2 years ago Feeds.dzone.com
Darktrace and Garland Technology Collaborate to Help Businesses Secure Operational Technology Environments - PRESS RELEASE. CAMBRIDGE, England, Jan. 24, 2024 /PRNewswire/ - Darktrace, a global leader in cyber security AI, and Garland Technology, a leading manufacturer of network TAP, aggregator, packet broker, data diode and inline bypass solutions, today ...
2 years ago Darkreading.com
Smishing Exploit Targets Cellular Routers to Intercept 2FA Codes - A new smishing exploit has been discovered targeting cellular routers, allowing attackers to intercept two-factor authentication (2FA) codes. This attack vector leverages the vulnerabilities in cellular routers used by individuals and organizations ...
3 months ago Infosecurity-magazine.com
15 Best Bandwidth Monitoring Tools in 2025 - By providing real-time data on network usage, bandwidth monitoring tools enable proactive management and quick resolution of issues that could impact network performance. It provides real-time monitoring of network performance, traffic analysis, and ...
6 months ago Cybersecuritynews.com
Entertainment Transformed: The Impact of Technology - From music production to live events, from television and film to gaming and social media, technology has changed the way we enjoy entertainment in both positive and negative ways. In this article, we will explore how different aspects of ...
2 years ago Securityzap.com
Wi-Fi 7's mission-critical role in enterprise, industrial networking - As we transition from Wi-Fi 6 to the more advanced Wi-Fi 7, we uncover the significant enhancements in speed, efficiency, and spectrum usage that set it apart from its predecessors. Rodrigues examines the crucial role of AI and machine learning in ...
2 years ago Helpnetsecurity.com
Network Protection: How to Secure a Network - Network security protects and monitors the links and the communications within the network using a combination of hardware, software, and enforced policies. Best practices for network security directly counter the major threats to the network with ...
1 year ago Esecurityplanet.com
Smart Home Technology: Your Gateway to Modern Living - Smart home technology offers homeowners an array of benefits, from increased convenience and comfort to enhanced safety and energy savings. Smart home technology offers convenience, comfort, safety, and energy savings. Smart home technology provides ...
2 years ago Securityzap.com Meow
Why Use a VLAN? Unveiling the Benefits of Virtual LANs in Network Security - Virtual Local Area Networks, or VLANs, serve as a critical computing technology designed for effective network traffic management. How VLANs function within a network environment revolves around effectively managing and directing network traffic. ...
2 years ago Securityboulevard.com
Sustainable Tech Solutions: Paving the Way for a Greener Tomorrow - In order to ensure a brighter tomorrow, sustainable technology solutions must be embraced and implemented. This article will explore the benefits, challenges, pros and cons of sustainable technologies, as well as showcase various sustainable ...
2 years ago Securityzap.com
Addressing the Cybersecurity Vendor Ecosystem Disconnect - COMMENTARY. If you are a member of the security team in charge of defending a network, you are probably accustomed to working with a technology stack composed of hardware, software, and data from dozens of different sources. Consolidating and joining ...
1 year ago Darkreading.com
Google Fi User Data Breached Through T-Mobile Hack - According to Google Fi's email sent to its customers on Monday, a limited amount of their customer data was exposed in T-Mobile's breach after suspicious activity was noted in a system that contained Google Fi's customer data. Google Fi, Google's ...
2 years ago Hackread.com
Biodegradable Technology: Sustainable Innovations - Biodegradable technology has a significant impact on our environment, but there is a shocking truth behind its implications. Biodegradable technology has transformed sustainability practices by challenging conventional manufacturing methods and ...
1 year ago Securityzap.com
Future of wireless technology: Key predictions for 2024 - Wi-Fi technology continues to evolve in ways that anticipate the needs of consumers, businesses, enterprise verticals, smart cities, and service providers, according to the Wireless Broadband Alliance. Tiago Rodrigues, CEO of the Wireless Broadband ...
2 years ago Helpnetsecurity.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
2 years ago Esecurityplanet.com
Top 19 Network Security Threats + Defenses for Each - Network security threats are technological risks that weaken the defenses of an enterprise network, endangering proprietary data, critical applications, and the entire IT infrastructure. There are seven major categories of network security issues ...
2 years ago Esecurityplanet.com
Green Technology Innovations: Sustainable Solutions - Unveil the reality behind green technology innovations by exploring the realm of sustainable solutions. Green technology presents a wide array of sustainable innovations, such as solar panels and wind turbines, offering eco-friendly solutions to our ...
1 year ago Securityzap.com
A Symphony of Network Success: Simplify, Secure, and Scale with Cisco SD-WAN Enhancements - Your network is like an orchestra, where each element assumes the role of a unique instrument-computers, devices, applications, security measures, remote connections. Cisco SD-WAN empowers both enterprise IT teams and managed service providers to ...
2 years ago Feedpress.me
10 Best Network as a Service for MSSP Providers - Network as a Service for Managed Security Service Providers offers a revolutionary way to provide networking and security services to clients. Network security leaders such as Perimeter81 offer Managed Service Provider partners a powerful, scalable, ...
1 year ago Cybersecuritynews.com
What is Proposition E and Why Should San Francisco Voters Oppose It? - In addition to removing certain police oversight authority from the Police Commission and expanding the circumstances under which police may conduct high-speed vehicle chases, Proposition E would also amend existing laws passed in 2019 to protect San ...
1 year ago Eff.org