ORing IAP-420
ORing IAP-420 devices (version 2.01e and earlier) contain command injection and code execution vulnerabilities in the management interface that could allow an attacker to invoke arbitrary commands and compromise the device. These vulnerabilities require network access to the management interface and in some cases user interaction. ORing is aware and working to produce a fix, but no patch is currently available. The vendor recommends defensive measures including network isolation, firewall protection, and secure remote access methods.
- Network access to the IAP-420 management interface
- In some attack scenarios, user interaction required (e.g., clicking a malicious link)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/a99ca378-bd20-4976-8071-6dd46ad2c571Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.