New SureMDM Vulnerabilities Could Expose Companies to Supply Chain Attacks

2 years ago 464
BOOK THIS SPACE FOR AD
ARTICLE AD

A number of security vulnerabilities have been disclosed in 42 Gears' SureMDM device management solution that could be weaponized by attackers to perform a supply chain compromise against affected organizations.

Cybersecurity firm Immersive Labs, in a technical write-up detailing the findings, said that 42Gears released a series of updates between November 2021 and January 2022 to close out multiple flaws affecting both the platform's Linux agent and the web console.

Automatic GitHub Backups

The India-based company's SureMDM is a cross-platform mobile device management service that allows enterprises to remotely monitor, manage, and secure their fleet of company-owned machines and employee-owned devices. 42Gears claims that SureMDM is used by over 10,000 companies worldwide.

The issues identified in the web dashboard are also of critical in nature, potentially allowing an attacker to gain code execution over individual devices, desktops, or servers. Furthermore, they could permit the injection of malicious JavaScript code as well as make it possible to register rogue devices and even spoof existing devices without any authentication.

"By chaining the vulnerabilities affecting the web console together, an attacker could disable security tools and install malware or other malicious code onto every Linux, MacOS or Android device with SureMDM installed," Kev Breen, Immersive Lab's director of threat research, said. "An attacker does not need to know customer details to achieve this or even have an account on SureMDM."

Prevent Data Breaches

This could then play out in the form of a supply chain attack wherein the exploit could be executed when a user logs in to the SureMDM console, resulting in the compromise of every managed device in the organization.

The second set of security weaknesses impact SureMDM's Linux Agent up to and including 3.0.5 that could enable an adversary to achieve remote code execution on the hosts as the root user. "This vulnerability could also be exploited with local access to the affected hosts in order to escalate privileges from standard to root user," Breen added.


Found this article interesting? Follow THN on Facebook, Twitter and LinkedIn to read more exclusive content we post.

Read Entire Article