Mirion Technologies Telemetry Enabled Devices
Mirion Technologies telemetry-enabled transmitter modules and boundary monitors contain weak cryptographic implementations (CWE-321: Improper Restriction of Rendered UI Layers or Frames, CWE-326: Inadequate Encryption Strength) that allow attackers with network access to intercept and potentially modify telemetry data in transit. Affected devices include DMC 3000 Transmitter Module, iPam Transmitter for DMC 2000, RDS-31 iTX variants, DRM-1/2 variants with solar packages, DRM and RDS-based boundary monitors, external transmitters, Telepole II, and MESH Repeater systems. The vendor has indicated no fix will be provided for these devices.
- Network access to the same network segment as the telemetry device
- Ability to passively or actively intercept network traffic (man-in-the-middle position)
- Knowledge of the telemetry protocol used by the device
Patching may require device reboot — plan for process interruption
/api/v1/advisories/4e677be9-1455-47e2-abf4-a8b57abbb078Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.