CVE-2025-9971

9.8 CRITICAL

📋 TL;DR

Planet Technology Industrial Cellular Gateways have a missing authentication vulnerability that allows unauthenticated remote attackers to manipulate device functionality. This affects organizations using these industrial networking devices for critical infrastructure or industrial control systems.

💻 Affected Systems

Products:
  • Planet Technology Industrial Cellular Gateway models
Versions: Specific affected versions not detailed in references
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects specific models of industrial cellular gateways used in critical infrastructure and industrial environments.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover allowing attackers to disrupt industrial operations, manipulate control systems, or use devices as entry points into industrial networks.

🟠

Likely Case

Unauthorized configuration changes, service disruption, or data interception from affected cellular gateways.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict network segmentation and access controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Vulnerability allows unauthenticated access to specific functionality, making exploitation straightforward for attackers who discover the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific firmware versions

Vendor Advisory: https://www.planet.com.tw/en/support/security-advisory/8

Restart Required: Yes

Instructions:

1. Check vendor advisory for affected models. 2. Download latest firmware from Planet Technology support portal. 3. Apply firmware update following vendor instructions. 4. Verify authentication is now required for all device functions.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Industrial Cellular Gateways from untrusted networks

Access Control Lists

all

Restrict network access to gateway management interfaces

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected devices
  • Deploy network monitoring and intrusion detection for gateway traffic

🔍 How to Verify

Check if Vulnerable:

Attempt to access device management functionality without authentication

Check Version:

Check device web interface or CLI for firmware version

Verify Fix Applied:

Verify authentication is required for all device management functions after patching

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access attempts to device management functions
  • Configuration changes from unexpected sources

Network Indicators:

  • Unusual traffic patterns to gateway management ports
  • Unauthorized configuration requests

SIEM Query:

source_ip:external AND destination_port:gateway_management AND authentication_failure:false

🔗 References

📤 Share & Export