CVE-2020-13712
📋 TL;DR
This CVE describes a command injection vulnerability in the user interface of oMG2000 and MG90 devices running vulnerable MGOS versions. Attackers can execute arbitrary commands with root privileges, potentially taking full control of affected devices. Organizations using oMG2000 with MGOS 3.15.1 or earlier, or MG90 with MGOS 4.2.1 or earlier are affected.
💻 Affected Systems
- oMG2000
- MG90
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with root-level access, allowing attackers to install persistent backdoors, exfiltrate sensitive data, pivot to other network systems, or render devices inoperable.
Likely Case
Unauthorized access to device configuration, credential theft, installation of cryptocurrency miners or botnet malware, and disruption of device functionality.
If Mitigated
Limited impact if network segmentation prevents lateral movement and monitoring detects anomalous command execution attempts.
🎯 Exploit Status
Command injection vulnerabilities typically have low exploitation complexity once the attack vector is identified. The requirement for user interface access suggests some level of authentication may be needed, but this could be bypassed if default credentials are used.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: oMG2000: MGOS 3.15.2 or later; MG90: MGOS 4.2.2 or later
Vendor Advisory: https://source.sierrawireless.com/-/media/support_downloads/security-bulletins/pdf/swi-psa-2020-006---mgos-security-update.ashx
Restart Required: Yes
Instructions:
1. Download the appropriate firmware update from Sierra Wireless support portal. 2. Backup current configuration. 3. Apply firmware update following vendor instructions. 4. Reboot device. 5. Verify successful update and restore configuration if needed.
🔧 Temporary Workarounds
Restrict User Interface Access
linuxLimit access to the device's user interface to trusted IP addresses only using firewall rules or access control lists.
iptables -A INPUT -p tcp --dport [UI_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [UI_PORT] -j DROP
Disable Unnecessary Services
linuxDisable the vulnerable user interface component if not required for operations.
systemctl stop [UI_SERVICE_NAME]
systemctl disable [UI_SERVICE_NAME]
🧯 If You Can't Patch
- Isolate affected devices in a separate network segment with strict firewall rules preventing outbound connections.
- Implement network monitoring and intrusion detection specifically for command injection patterns targeting these devices.
🔍 How to Verify
Check if Vulnerable:
Check MGOS version via device web interface or CLI. For CLI: 'mgos-version' or 'show version' commands may be available.
Check Version:
mgos-version || show version || cat /etc/mgos-version
Verify Fix Applied:
Verify MGOS version is 3.15.2+ for oMG2000 or 4.2.2+ for MG90. Test user interface functionality to ensure commands with special characters are properly sanitized.
📡 Detection & Monitoring
Log Indicators:
- Unusual command execution patterns in system logs
- Multiple failed authentication attempts followed by successful login
- Commands containing shell metacharacters (;, |, &, $, etc.) in UI access logs
Network Indicators:
- Unexpected outbound connections from devices
- Traffic to known malicious IPs or domains
- Anomalous patterns in UI protocol traffic
SIEM Query:
source="device_logs" AND (command="*;*" OR command="*|*" OR command="*&*" OR command="*$(*")