CVE-2020-13712

7.8 HIGH

📋 TL;DR

This CVE describes a command injection vulnerability in the user interface of oMG2000 and MG90 devices running vulnerable MGOS versions. Attackers can execute arbitrary commands with root privileges, potentially taking full control of affected devices. Organizations using oMG2000 with MGOS 3.15.1 or earlier, or MG90 with MGOS 4.2.1 or earlier are affected.

💻 Affected Systems

Products:
  • oMG2000
  • MG90
Versions: oMG2000: MGOS 3.15.1 and earlier; MG90: MGOS 4.2.1 and earlier
Operating Systems: MGOS
Default Config Vulnerable: ⚠️ Yes
Notes: Devices with user interface access enabled are vulnerable. The vulnerability requires access to the user interface, which may be web-based or CLI depending on configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with root-level access, allowing attackers to install persistent backdoors, exfiltrate sensitive data, pivot to other network systems, or render devices inoperable.

🟠

Likely Case

Unauthorized access to device configuration, credential theft, installation of cryptocurrency miners or botnet malware, and disruption of device functionality.

🟢

If Mitigated

Limited impact if network segmentation prevents lateral movement and monitoring detects anomalous command execution attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Command injection vulnerabilities typically have low exploitation complexity once the attack vector is identified. The requirement for user interface access suggests some level of authentication may be needed, but this could be bypassed if default credentials are used.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: oMG2000: MGOS 3.15.2 or later; MG90: MGOS 4.2.2 or later

Vendor Advisory: https://source.sierrawireless.com/-/media/support_downloads/security-bulletins/pdf/swi-psa-2020-006---mgos-security-update.ashx

Restart Required: Yes

Instructions:

1. Download the appropriate firmware update from Sierra Wireless support portal. 2. Backup current configuration. 3. Apply firmware update following vendor instructions. 4. Reboot device. 5. Verify successful update and restore configuration if needed.

🔧 Temporary Workarounds

Restrict User Interface Access

linux

Limit access to the device's user interface to trusted IP addresses only using firewall rules or access control lists.

iptables -A INPUT -p tcp --dport [UI_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [UI_PORT] -j DROP

Disable Unnecessary Services

linux

Disable the vulnerable user interface component if not required for operations.

systemctl stop [UI_SERVICE_NAME]
systemctl disable [UI_SERVICE_NAME]

🧯 If You Can't Patch

  • Isolate affected devices in a separate network segment with strict firewall rules preventing outbound connections.
  • Implement network monitoring and intrusion detection specifically for command injection patterns targeting these devices.

🔍 How to Verify

Check if Vulnerable:

Check MGOS version via device web interface or CLI. For CLI: 'mgos-version' or 'show version' commands may be available.

Check Version:

mgos-version || show version || cat /etc/mgos-version

Verify Fix Applied:

Verify MGOS version is 3.15.2+ for oMG2000 or 4.2.2+ for MG90. Test user interface functionality to ensure commands with special characters are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in system logs
  • Multiple failed authentication attempts followed by successful login
  • Commands containing shell metacharacters (;, |, &, $, etc.) in UI access logs

Network Indicators:

  • Unexpected outbound connections from devices
  • Traffic to known malicious IPs or domains
  • Anomalous patterns in UI protocol traffic

SIEM Query:

source="device_logs" AND (command="*;*" OR command="*|*" OR command="*&*" OR command="*$(*")

🔗 References

📤 Share & Export