eCommerceNews Australia - Technology news for digital commerce decision-makers
Story image

Ten vulnerabilities found in Ruijie Reyee cloud platform

Yesterday

Recent research by Claroty's Team82 has identified ten vulnerabilities within the Ruijie Networks Reyee cloud management platform and associated Reyee OS network devices.

Ruijie Networks is a provider of networking devices and cloud services, serving enterprises, educational institutions, government organisations, and service providers across 90 countries, including Australia.

Their devices are widely used in public places such as airports and shopping malls to provide free Wi-Fi access.

The vulnerabilities discovered could potentially be exploited by malicious actors to execute code on cloud-enabled devices. This exploitation may allow attackers to gain control over tens of thousands of devices, posing a significant risk to users.

Team82 elaborated on these vulnerabilities, stating: "We indeed did find 10 vulnerabilities that if exploited could expose every Ruijie-connected device and pose devastating consequences for its users." These weaknesses exemplify the security challenges inherent in internet-of-things (IoT) devices.

Additionally, Team82 has demonstrated a specific attack method termed "Open Sesame".

The attack involves an individual in close physical proximity exploiting leaked identifiers from Ruijie Reyee access points via the cloud, thereby executing arbitrary code and accessing the internal network of the device.

Detailing the attack, the researchers noted: "An attacker in close proximity to a Ruijie access point can sniff beacon messages from the device and leak the device serial number... We can then combine vulnerabilities we uncovered, especially in Ruijie's implementation of the MQTT communication protocol to impersonate the cloud and send a message to the target device." This message could include malicious operating system commands that expose the internal network of the device.

Ruijie Networks has responded to these findings by addressing the vulnerabilities in an update to its cloud infrastructure, negating the need for users to take any further action.

Follow us on:
Follow us on LinkedIn Follow us on X
Share on:
Share on LinkedIn Share on X