{"id":20595,"date":"2023-07-17T15:33:59","date_gmt":"2023-07-17T13:33:59","guid":{"rendered":"https:\/\/herolab.usd.de\/?p=20595"},"modified":"2023-07-17T16:20:46","modified_gmt":"2023-07-17T14:20:46","slug":"security-advisory-multitech-conduit-ap-mtcap2-l4e1","status":"publish","type":"post","link":"https:\/\/herolab.usd.de\/en\/security-advisory-multitech-conduit-ap-mtcap2-l4e1\/","title":{"rendered":"Security Advisory for MultiTech Conduit AP MTCAP2-L4E1"},"content":{"rendered":"\n<p>The analysts at&nbsp;<a href=\"http:\/\/herolab.usd.de\/en\/our-experts\/\" target=\"_blank\" rel=\"noreferrer noopener\">usd HeroLab<\/a>&nbsp;examined the LoRaWAN access point MultiTech Conduit AP MTCAP2-L4E1 while conducting their security analyses.<\/p>\n\n\n\n<p>During the assessment they discovered that the whole webinterface of the access point is vulnerable to cross-site request forgery attacks (CSRF) attacks. An attacker might be able to cause a user to unknowingly send requests to a vulnerable application. If the user has previously authenticated himself towards the application, those requests will be executed according to the user's privileges. Should the user possess administrative privileges this might enable the attacker to fully compromise the system.<\/p>\n\n\n\n<p>The vulnerabilities were reported to the vendor under the\u00a0<a href=\"https:\/\/herolab.usd.de\/en\/responsible-disclosure\/\" target=\"_blank\" rel=\"noreferrer noopener\">Responsible Disclosure Policy<\/a>\u00a0and subsequently fixed. Detailed information about the advisory can be found\u00a0<a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2023-0004\/\" target=\"_blank\" data-type=\"URL\" data-id=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2023-0004\/\" rel=\"noreferrer noopener\">here<\/a>.<\/p>\n\n\n\n<p><strong>About usd HeroLab Security Advisories<\/strong><\/p>\n\n\n\n<p>In order to protect businesses against hackers and criminals, we must ensure that our skills and knowledge are up to date at all times. Therefore, security research is just as important to our work as is building up a security community to promote an exchange of knowledge. After all, more security can only be achieved if many people take on the task.<\/p>\n\n\n\n<p>We analyze attack scenarios, which are changing constantly, and publish a series of Security Advisories on current vulnerabilities and security issues \u2013 always in line with our&nbsp;<a href=\"https:\/\/herolab.usd.de\/en\/responsible-disclosure\/\" target=\"_blank\" rel=\"noreferrer noopener\">Responsible Disclosure Policy<\/a>.<\/p>\n\n\n\n<p>Always in the name of our mission: \u201cmore security.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The analysts at&nbsp;usd HeroLab&nbsp;examined the LoRaWAN access point MultiTech Conduit AP MTCAP2-L4E1 while conducting their security analyses. During the assessment they discovered that the whole webinterface of the access point is vulnerable to cross-site request forgery attacks (CSRF) attacks. An attacker might be able to cause a user to unknowingly send requests to a vulnerable [&hellip;]<\/p>\n","protected":false},"author":90,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[76,85],"tags":[207,88,128,86],"class_list":["post-20595","post","type-post","status-publish","format-standard","hentry","category-news","category-security-advisories-en","tag-multitech-conduit-ap-mtcap2-l4e1","tag-pentest-en","tag-security-analysis-en","tag-security-research-en"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/posts\/20595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/90"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=20595"}],"version-history":[{"count":2,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/posts\/20595\/revisions"}],"predecessor-version":[{"id":20598,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/posts\/20595\/revisions\/20598"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=20595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/categories?post=20595"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/tags?post=20595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}