CVE-2023-47611

7.8 HIGH

📋 TL;DR

A local privilege escalation vulnerability in Telit Cinterion cellular modules allows low-privileged attackers to gain manufacturer-level privileges. This affects multiple Telit Cinterion product lines including BGS5, EHS5/6/8, PDS5/6/8, ELS61/81, and PLS62. Organizations using these modules in IoT/embedded devices are at risk.

💻 Affected Systems

Products:
  • Telit Cinterion BGS5
  • Telit Cinterion EHS5
  • Telit Cinterion EHS6
  • Telit Cinterion EHS8
  • Telit Cinterion PDS5
  • Telit Cinterion PDS6
  • Telit Cinterion PDS8
  • Telit Cinterion ELS61
  • Telit Cinterion ELS81
  • Telit Cinterion PLS62
Versions: All versions prior to patched firmware
Operating Systems: Embedded OS on Telit Cinterion modules
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to the module interface (AT commands or other local interfaces).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full manufacturer-level control over the module, enabling firmware modification, data exfiltration, persistence, and use as a foothold into connected systems.

🟠

Likely Case

Local attacker elevates privileges to bypass security controls, access sensitive configuration data, and potentially compromise the entire device.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the specific module, though privilege escalation still occurs.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local access but low complexity for privilege escalation once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check with Telit Cinterion for specific firmware versions

Vendor Advisory: https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-216-telit-cinterion-thales-gemalto-modules-improper-privilege-management-vulnerability/

Restart Required: Yes

Instructions:

1. Contact Telit Cinterion support for patched firmware. 2. Backup current configuration. 3. Apply firmware update via supported method (AT commands or management interface). 4. Verify update and restore configuration if needed.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit physical and logical access to module interfaces

Network Segmentation

all

Isolate devices using these modules from critical networks

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized local access to modules
  • Monitor for unusual AT command activity or privilege changes on affected devices

🔍 How to Verify

Check if Vulnerable:

Check firmware version against Telit Cinterion advisory. Attempt privilege escalation via documented methods if authorized.

Check Version:

AT+CGMR (check with module documentation for exact command)

Verify Fix Applied:

Verify firmware version is updated to patched version from vendor. Test privilege escalation attempts fail.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • AT commands attempting manufacturer-level operations from low-privileged users

Network Indicators:

  • Unusual traffic from module interfaces
  • Attempts to access restricted management interfaces

SIEM Query:

Search for AT command sequences containing privilege escalation patterns or manufacturer-level operations from non-privileged sources

🔗 References

📤 Share & Export