OTPulse

IRZ RUH2 3G Firmware Overwrite Vulnerability (Update A)

Monitor7.2ICS-CERT ICSA-16-138-01AFeb 18, 2016
Attack VectorNetwork
Auth RequiredHigh
ComplexityLow
User InteractionNone needed
Summary

The IRZ RUH2 3G gateway is vulnerable to firmware overwrite attacks. An authenticated attacker with high-level credentials can upload and install arbitrary firmware to the device without proper integrity or authenticity verification. This affects all versions of the RUH2 firmware. The vendor has not released a patch and does not plan to fix this vulnerability. The RUH2 is commonly deployed as a remote monitoring gateway in industrial control systems and utilities, making unauthorized firmware modification a significant threat to operational continuity and device integrity.

What this means
What could happen
An attacker with high-level credentials could overwrite the device firmware, gaining complete control of the RUH2 3G gateway and potentially disrupting remote monitoring, data collection, or control communications for connected industrial equipment.
Who's at risk
Water utilities, electric utilities, and other critical infrastructure operators using IRZ RUH2 3G gateways for remote monitoring, SCADA data relay, or industrial equipment communication should prioritize defense of these devices, as they are critical network chokepoints between field equipment and control centers.
How it could be exploited
An attacker with administrative or engineering credentials could upload a malicious firmware file to the RUH2 device via its management interface. Once uploaded without proper integrity verification, the malicious firmware would overwrite the legitimate firmware, giving the attacker full control of the device and its network communications.
Prerequisites
  • Administrative or engineering-level credentials on the RUH2 device
  • Network access to the RUH2 management interface (typically Ethernet or serial console)
  • Ability to craft or host a malicious firmware file compatible with RUH2
High privileges required (engineering credentials)No authentication bypassNo patch availableFirmware integrity not verified on uploadCritical gateway device in OT network
Exploitability
Low exploit probability (EPSS 0.1%)
Affected products (1)
ProductAffected VersionsFix Status
RUH2: vers:all/*All versionsNo fix (EOL)
Remediation & Mitigation
0/4
Do now
0/2
HARDENINGRestrict administrative access to RUH2 device management interface to authorized personnel only; use strong, unique credentials and disable default accounts
HARDENINGImplement network segmentation to limit access to RUH2 management interfaces from trusted engineering workstations only
Schedule — requires maintenance window
0/2

Patching may require device reboot — plan for process interruption

HARDENINGMonitor RUH2 device for unauthorized firmware modification attempts and audit logs for suspicious administrative activity
WORKAROUNDMaintain offline backups of the original RUH2 firmware to enable rapid recovery in case of compromise
↑↓ Navigate · Esc Close
API: /api/v1/advisories/7449b1e3-ad93-456f-b41e-bdfc78464dd2
IRZ RUH2 3G Firmware Overwrite Vulnerability (Update A) | CVSS 7.2 - OTPulse