CERT AdvisoriesLow

Critical Vulnerabilities in PUSR USR-W610 IoT Devices Expose Authentication Risks

2 min readSource: CISA Cybersecurity Advisories

CISA warns of severe flaws in Jinan USR IOT's USR-W610 devices, enabling authentication bypass, DoS attacks, and credential theft. Patch immediately.

Critical Flaws in PUSR USR-W610 IoT Devices Expose Networks to Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory (ICSA-26-050-03) highlighting multiple critical vulnerabilities in Jinan USR IOT Technology Limited’s (PUSR) USR-W610 IoT devices. If exploited, these flaws could allow attackers to disable authentication, trigger denial-of-service (DoS) conditions, or steal valid user credentials—including administrator privileges.

Technical Details of the Vulnerabilities

While CISA’s advisory references a CSAF file for full technical specifications, the following risks have been identified:

  • Authentication Bypass: Attackers may exploit weaknesses to circumvent authentication mechanisms, gaining unauthorized access to device configurations or network resources.
  • Denial-of-Service (DoS): Malicious actors could trigger crashes or service disruptions, rendering devices inoperable.
  • Credential Theft: Vulnerabilities may enable the exfiltration of valid credentials, including those with administrative privileges, facilitating further lateral movement within a network.

The advisory specifies that affected versions include USR-W610 devices running vulnerable firmware, though exact version numbers are not publicly disclosed in the summary.

Impact Analysis

These vulnerabilities pose significant risks to organizations relying on USR-W610 devices for industrial or operational technology (OT) environments. Successful exploitation could lead to:

  • Unauthorized access to sensitive systems or data.
  • Operational disruptions due to DoS attacks.
  • Privilege escalation via stolen administrator credentials.

Given the device’s potential use in critical infrastructure, the flaws could have cascading effects on connected systems, amplifying the attack surface for threat actors.

Recommended Actions

CISA urges affected organizations to take the following steps:

  1. Apply Patches Immediately: Monitor PUSR’s official channels for firmware updates addressing these vulnerabilities. The advisory links to the CSAF file for technical guidance.
  2. Segment Networks: Isolate USR-W610 devices from critical systems to limit lateral movement in case of compromise.
  3. Enforce Strong Authentication: Implement multi-factor authentication (MFA) for device access where possible.
  4. Monitor for Exploitation: Deploy intrusion detection systems (IDS) to identify anomalous activity targeting these devices.

For further details, refer to CISA’s official advisory.

This advisory underscores the ongoing risks in IoT and OT security, emphasizing the need for proactive vulnerability management in industrial environments.

Share