Intel Updates 2G Modem Firmware

Tuesday, April 24, 2018 @ 06:04 PM gHale

Intel has firmware updates to mitigate a buffer overflow in its 2G Modem, according to a report with ICS-CERT.

Successful exploitation of this remotely exploitable buffer overflow vulnerability may allow remote code execution.

RELATED STORIES
Advantech Working to Fix HMI Holes
Siemens Mitigation Plan for Simatic App
Abbott Updates Defibrillator
Biosense Fixes System Vulnerabilities

The vulnerability affects Intel 2G modem products where the earthquake tsunami warning system (ETWS) feature is enabled in modem firmware. Devices equipped with an affected modem, when connected to a rogue 2G base station where non-compliant 3GPP software may be operational, are potentially at risk.

Dr. Ralph Phillip Weinmann and Dr. Nico Golde from Comsecuris reported this vulnerability to Intel, and Intel reported the vulnerability to NCCIC.

The following products use the vulnerable Intel modem with 2G capability and ETWS enabled:
• Intel XMM71xx
• Intel XMM72xx
• Intel XMM73xx
• Intel XMM74xx
• Sofia 3G
• Sofia 3G-R
• Sofia 3G-R W

Versions that support 2G and the ETWS feature delivered to system manufactures prior to the disclosure of CVE-2018-3624 may be affected.

Buffer overflow in ETWS processing module allows a remote attacker to potentially execute arbitrary code via an adjacent network.

CVE-2018-3624 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 8.2.

The product sees use mainly in the communication and Information Technology sectors. It also sees action on a global basis.

No known public exploits specifically target this vulnerability. This vulnerability is exploitable remotely. High skill level is needed to exploit.

Intel is making firmware updates available to device manufacturers that protect systems from this vulnerability. End users should check with their device manufacturers and apply any available updates as soon as practical.

Intel released a security advisory.



Leave a Reply

You must be logged in to post a comment.