Ovarro TBox (Update A)
Multiple vulnerabilities exist in Ovarro TBox devices (MS-CPU32-S2, MS-CPU32, TG2, TG2 derivatives, RM2, and TBoxLT2) that allow authenticated remote attackers to execute arbitrary code. The vulnerabilities are related to insecure code execution mechanisms (CWE-94), weak permission controls (CWE-732), resource exhaustion (CWE-400), unencrypted credential storage (CWE-522), weak cryptographic key storage (CWE-321), and path traversal (CWE-23). Successful exploitation could result in remote code execution and denial-of-service conditions.
- Valid login credentials for the TBox device
- Network access to the TBox (direct or via remote access tool like VPN)
- Device running vulnerable firmware version below 1.46 (TBox version 12.4 or earlier)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/65a2fb98-dbcd-4234-b235-19048cba3b1eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.