Saturday, May 4, 2024
HomeVulnerabilitiesFileWave MDM lets remote attackers compromise your organization's mobile devices

FileWave MDM lets remote attackers compromise your organization’s mobile devices

FileWave is a universal leader in manufacturing software for business and education purposes, specializing in ChromeOS, Windows, macOS, and Android technologies.

MDM is a Mobile Device Management System that provides IT, administrators, with a chance to monitor and keep surveillance of all devices of an organization.

FileWave MDM at present provides a platform to iOS, macOS, Windows, Android, Television, phones, tablets, and workstations.

How is FileWave Used?

The admin interface of FileWave

Using a FileWave MDM the IT administrators can see and control the crucial aspects of a device such as configurations, security, and location access, including auxiliary device data.

Admins also use this technology to push important software updates, manage device settings, and when essential delete all the data remotely.

All these are done when the managed devices send trigger reports to the main server and in return, the master server pushes the commands in form of files, software, or packages.

The Vulnerability

In past years hackers have been active for more with injecting a huge number of vulnerabilities to a remote system or software.

There are basically two issues found by the operational technology firm, they are:

  1. Practising a hard-coded cryptographic key (CVE-2022-34906), which allows an attacker to destroy the legitimate features of a remote system and extract all the sensitive data and install malicious ransomware packages.
  2. And, the second one is an privacy bypass (CVE-2022-34907)

Researchers claim that they have found more than 1100 unsafe FileWave internet servers of large enterprises, government, and educational sectors.

They also said that if these loopholes are successfully used then anyone can access the remote devices. This dangerous vulnerability can provide all digital access to several threat actors across the network.

The Faulty Versions

The fresh vulnerabilities were reported on 14th July 2022,  the release date of version 14.7.2.

Precautions and Mitigations

As per the reports, there are no precautions addressed as far but yes the users can apply for an update as soon as possible to mitigate any vulnerable port attacks.

The fresh and ever-increasing vulnerabilities serve the need for software companies to secure their product’s endpoint.

REvil cybercrime is one of the well-known ones. Last year this cybercrime gang abused the then-zero-day flaw in Kaseya’s IT Management Solution. It attacked 1500 subsequent businesses with its ransomware.

You can read about more of such prevailing vulnerabilities here.


If you found this article interesting then please subscribe to cybermetrics.eu


By: Ankita Anand, Editor: Sneha

RELATED ARTICLES

Most Popular

Recent Comments