Vulnerabilities in MiCODUS GPS Trackers Allow Remote Car Hacking

Vulnerabilities in GPS trackers
Written by Emma Davis

Information security specialists have discovered serious vulnerabilities in GPS trackers, which are used in about 1.5 million cars in 169 countries around the world. We are talking about the device MiCODUS MV720, which contains six vulnerabilities at once.

Experts from BitSight say that vehicles equipped with these GPS trackers are used by many Fortune 50 companies, as well as governments, military, law enforcement, aerospace, shipping and manufacturing companies.

Vulnerabilities in GPS trackers
MiCODUS MV720 users on the map

Let me remind you that we also said that GPS devices may behave unpredictably in the coming days due to a bug in the GPS Daemon, and also that Audi and Volkswagen customer data put on sale.

A hacker who breaks into a vulnerable MV720 will be able to use the tracker to track the vehicle, be able to immobilize it, or simply collect route information and manipulate the data. According to the researchers, such hacks can have serious consequences for the national security of different countries.

The experts studied the specific model of MiCODUS because it is an inexpensive (about $20) and very popular device that has cellular-enabled tracking features and can also be used for potentially dangerous activities, including turning off the fuel supply.

Not all vulnerabilities discovered by BitSight have received a CVE identifier yet, but they are described as follows.

CVE-2022-2107 (CVSS score 9.8): A hard-coded master password on an API server that allows a remote and unauthenticated attacker to take control of any MV720 tracker, cut off fuel, track users, and disable alarms.

Vulnerabilities in GPS trackers

CVE-2022-2141 (CVSS score 9.8): A broken authentication scheme that allows anyone to send commands to a GPS tracker via SMS and execute them with administrator rights.

Vulnerabilities in GPS trackers
Supported SMS Commands

CVE Not Assigned (CVSS 8.1): Weak default password (123456) on all MV720 trackers, and user is not required to change it after initial device setup.

CVE-2022-2199 (CVSS score 7.5): An XSS vulnerability on the main web server that could allow an attacker to gain access to user accounts, interact with applications, and view all information available to a specific user.

CVE-2022-34150 (CVSS score 7.1): An insecure direct link to an object on the main web server that allows a logged-in user to access the data of any ID in the server’s database.

CVE-2022-33944 (CVSS score 6.5): An insecure direct link to an object on the main web server that allows unauthorized users to generate Excel reports on GPS tracker activity.

Vulnerabilities in GPS trackers

During their research, BitSight experts developed five PoC exploits for five vulnerabilities that received identification numbers and demonstrated the exploitation of bugs in real conditions.

Interestingly, the researchers found the described vulnerabilities as early as September 9, 2021, after which they tried to immediately contact MiCODUS engineers, but this was not so easy. Repeated attempts to get in touch with the company and find a person who could accept the vulnerability report were unsuccessful. As a result, on January 14, 2022, BitSight representatives shared all the technical details about the vulnerabilities with the US Department of Homeland Security and asked them to contact the vendor themselves.

Unfortunately, MiCODUS MV720 GPS trackers are currently still vulnerable to the above problems, as the manufacturer has not yet released patches.

BitSight recommends that individuals and organizations currently using MiCODUS MV720 GPS trackers disable these devices until fixes are available. Organizations using any MiCODUS GPS tracker, regardless of model, should be aware of the insecure architecture of its systems, which can put any device at risk.the researchers write.

Also, the US Cybersecurity and Infrastructure Security Agency (CISA) has already prepared its own security bulletin warning that MiCODUS devices may pose a threat.

Sending
User Review
0 (0 votes)
Comments Rating 0 (0 reviews)

About the author

Emma Davis

I'm writer and content manager (a short time ago completed a bachelor degree in Marketing from the Gustavus Adolphus College). For now, I have a deep drive to study cyber security.

Leave a Reply

Sending