CVE-2023-47610
📋 TL;DR
This vulnerability allows remote unauthenticated attackers to execute arbitrary code on Telit Cinterion EHS5/6/8 cellular modules by sending specially crafted SMS messages. The buffer overflow occurs when processing SMS input without proper size validation. Organizations using these cellular modules in IoT devices, industrial control systems, or embedded applications are affected.
💻 Affected Systems
- Telit Cinterion EHS5
- Telit Cinterion EHS6
- Telit Cinterion EHS8
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the cellular module allowing attackers to execute arbitrary code, potentially gaining persistent access to connected systems, exfiltrating data, or disrupting operations.
Likely Case
Remote code execution leading to device compromise, data theft, or disruption of device functionality in vulnerable deployments.
If Mitigated
Limited impact with proper network segmentation and SMS filtering controls in place, though risk remains if modules are internet-facing.
🎯 Exploit Status
Exploitation requires sending specially crafted SMS messages to vulnerable devices. No authentication is required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check with Telit/Thales for specific patched firmware versions
Restart Required: Yes
Instructions:
1. Contact Telit/Thales support for patched firmware. 2. Backup device configuration. 3. Apply firmware update via supported method (OTA or physical connection). 4. Verify update success. 5. Restart device.
🔧 Temporary Workarounds
SMS Filtering
allImplement SMS filtering at the cellular carrier level to block malicious SMS messages
Network Segmentation
allIsolate cellular modules from critical networks using firewalls and VLANs
🧯 If You Can't Patch
- Implement strict network segmentation to isolate vulnerable devices
- Deploy SMS filtering solutions to block suspicious SMS traffic
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against vendor advisory. Devices running unpatched firmware are vulnerable.
Check Version:
AT+CGMR (check with device documentation for exact command)
Verify Fix Applied:
Verify firmware version matches patched version from vendor advisory and test SMS handling functionality.
📡 Detection & Monitoring
Log Indicators:
- Unusual SMS processing errors
- Device reboots or crashes after SMS receipt
- Unexpected process execution
Network Indicators:
- SMS messages with unusual payloads or sizes
- Outbound connections from cellular modules to unexpected destinations
SIEM Query:
source="cellular_module" AND (event="sms_processing_error" OR event="device_crash")
🔗 References
- https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-23-018-telit-cinterion-thales-gemalto-modules-buffer-copy-without-checking-size-of-input-vulnerability/
- https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-23-018-telit-cinterion-thales-gemalto-modules-buffer-copy-without-checking-size-of-input-vulnerability/