Lancom LCOS with root password vulnerability 

B2B Cyber ​​Security ShortNews

Share post

Lancom and the BSI report a configuration bug for the LCOS operating system: A vulnerability with the CVSS value of 6.8 can enable the acquisition of administrator rights. An update is available.

The messages on the Lancom website and on the BSI website are not entirely compliant. Both report a vulnerability from LCOS version 10.80 RU1 onwards, but while Lancom sees no danger: “Unauthorized access to the router via the WAN (Internet) is not possible due to this security gap”, the BSI uses the note in its heading: “ Vulnerability allows gaining administrator rights”.

Root password is overwritten blank

Apparently Lancom was informed by a user that when another administrative user is created using the Windows setup assistant, the administrator's root password is simply deleted. LCOS is affected by this security vulnerability starting with version 10.80 RU1. Lower LCOS versions or other LANCOM operating systems are not affected. The behavior is fixed in LCOS version 10.80 SU4.

Lancom also announces: In public spot scenarios with a separate guest network, management access from the guest network to the access points is not possible due to the use of VLAN or a WLC tunnel and thus a threat is excluded. LANCOM Systems strongly recommends installing the error-corrected LCOS version 10.80 SU4.

More at Lancom-Systems.de

 


About LANCOM Systems

LANCOM Systems GmbH is a leading European manufacturer of network and security solutions for business and administration. The portfolio includes hardware (WAN, LAN, WLAN, firewalls), virtual network components and cloud-based software-defined networking (SDN). Software and hardware development as well as production take place mainly in Germany, as is the hosting of the network management. Particular attention is paid to trustworthiness and security. The company has committed itself to ensuring that its products are free from backdoors and is the bearer of the “IT Security Made in Germany” quality mark initiated by the Federal Ministry of Economics.


 

Matching articles on the topic

New Russian malware Kapeka discovered

The security experts at WithSecure have exposed Kapeka. The new malware appears to have ties to the Russian hacker group Sandworm. Several factors ➡ Read more

Lancom LCOS with root password vulnerability 

Lancom and the BSI report a configuration bug for the LCOS operating system: A vulnerability with the CVSS value of 6.8 can ➡ Read more

XenServer and Citrix Hypervisor vulnerabilities

Citrix warns of two vulnerabilities in XenServer and Citrix Hypervisor. The security vulnerabilities are only moderately serious, but there is still one ➡ Read more

Successful phishing: Attackers attack MFA service providers for Cisco Duo 

Cisco calls its Zero Trust security platform “Duo” for short. Their access is protected by state-of-the-art multi-factor authentication (MFA). Through a ➡ Read more

North Korean state hackers are relying on new espionage tactics

First talk, then hack: The North Korean hacker group TA427 tries to address foreign policy experts in a rather unspectacular way in order to get their point of view ➡ Read more

Disinformation campaigns from China

The report that China is allegedly disrupting and manipulating elections by using AI-generated content to spread disinformation should not be ➡ Read more

OT security status report

A recent survey of industrial companies worldwide – including Germany – paints a worrying picture about the state of OT security ➡ Read more

Holy LG WebOS endangers presentation TVs in companies 

Many companies now have large TV sets in conference rooms for events or video conferences. This unexpectedly also has vulnerabilities behind it ➡ Read more