SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies.
Teltonika RUT9XX routers with firmware before 00.04.233 provide a root terminal on a serial interface without proper access control. This allows attackers with physical access to execute arbitrary commands with root privileges. We recommend to update Teltonika RUT9XX routers to version RUT9XX_R_00.04.233 or later. For further details, see the full security advisory. Read More
Teltonika RUT9XX routers with firmware before 00.04.233 are prone to multiple unauthenticated OS command injection vulnerabilities in autologin.cgi and hotspotlogin.cgi due to insufficient user input sanitization. This allows remote attackers to execute arbitrary commands with root privileges. We recommend to update Teltonika RUT9XX routers to version RUT9XX_R_00.05.01.1 or later. For further details, see the full security advisory. Read More
Smarty 3.1.32 or below is prone to a path traversal vulnerability due to insufficient sanitization of code in Smarty templates. This allows attackers controlling the Smarty template to bypass the trusted directory security restriction and read arbitrary files. We recommend to update Smarty to version 3.1.33 or later. For further details, see the full security advisory. Read More
phpWhois and some of its forks in versions before 5.1.0 are prone to a code injection vulnerability due to insufficient sanitization of returned WHOIS data. This allows attackers controlling the WHOIS information of a requested domain to execute arbitrary PHP code in the context of the application. We recommend to update phpWhois to version jsmitty12: 5.1.0 or later. For further details, see the full security advisory. Read More
On behalf of the Austrian Federal Ministry of Transport, Innovation and Technology (bmvit), a research team consisting of cbased (Community-Based Innovation Systems), SBA Research, and the Vienna University of Economics and Business (WU), examines the impact of the data protection legislation (EU-DSGVO), which will become effective May 2018, on Big… Read More
Tomasz Miksa has become the chair of the newly endorsed DMP Common Standards working group at the Research Data Alliance. He will present the goals of the group for the next 18 months at the 10th Research Data Alliance Plenary in Montreal, Canada. The group brings together a broad… Read More
Dimitris Simos is invited to give a colloquium talk at the University of Bergamo, Italy regarding “combinatorial methods and algorithms in security testing”.
Markus Klemen @ e-day 2016 SBA Research contributed two talks to this years’ e-day of the Austrian Chamber of Commerce. Markus Klemen talked about loyalty and motivation of employees with regard to ethical issues and psychological considerations. Peter Kieseberg described current social engineering tricks and attack vectors. Peter… Read More
SQL injection vulnerability in the RXTEC RXAdmin Login Page allows remote attackers to execute arbitrary SQL commands via several HTTP parameter. Read More
Polycom BToE Connector up to version 2.3.0 allows unprivileged windows users to execute arbitrary code with SYSTEM privileges. We recommend to update Polycom BToE Connector to version 3.0.0 or later. For further details, see the full security advisory. Read More
Together with sipgate and ISMK Stralsund, Gabriel Gegenhuber, researcher at SBA Research and University of Vienna, and Michael Pucher, researcher at SBA research, discovered and investigated a vulnerability in the Voice of LTE (VoLTE) stack that is broadly used within MediaTek-based smartphones. ∞
In the Mediatek modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. ∞