• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security Cyber Security data security Device security Intruders Latest Cybersecurity News Linux security Mac security Windows security

SureMDM security vulnerabilities can lead to Supply Chain Attacks

John Greenwood Posted On February 1, 2022
0



SureMDM security vulnerabilities

Multiple security vulnerabilities have been disclosed in 42 Gears SureMDM solution. It is a mobile device management solution that can be manipulated by threat actors to execute supply chain attacks.

Identifying the SureMDM security vulnerabilities

A Cybersecurity firm called Immersive Labs was the one that first identified the vulnerabilities and has mentioned the details their paper. 42 Gears has released a series of updates from Nov 2021 to Jan 2022 addressing these multiple flaws affecting their Linux agent and web console.

42 Gears is a India-based mobile device management firm that has the SureMDM product which supports cross-platform management allowing admins to remotely monitor, manage, control and secure their company-owned, BYOD, and COPE devices.

As per the information shared by 42 Gears, SureMDM is actively used by around 10,000 organizations around the world.

Analyzing the SureMDM security vulnerabilities

The SureMDM security vulnerabilities look critical in nature as it allows attackers to perform remote code execution on mobile devices, laptops, desktops and servers. Additionally, these vulnerabilities can also allow attackers to inject malicious JavaScript code and register rogue devices with spoofing thus making unauthorized devices a legal one.

SureMDM security vulnerabilities
Source: SureMDM Product UI

The following is the list of security vulnerabilities identified,

  • SureMDM agent spoofing
  • SureMDM agent authentication bypass
  • SureMDM dashboard XSS
  • SureMDM agent remote code execution
  • SureMDM Linux agent command injection
  • SureMDM Linux agent remote code execution
  • SureMDM Linux agent default root credentials
  • SureMDM Linux agent local privilege escalation
  • SureMDM Linux Sensitive Information Disclosure  

With these multiple vulnerabilities an attacker will be able to disable security programs and deploy payloads into Linux, MacOS and Android devices with SureMDM as the catalyst for their operation said Kev Breen, Director of Threat Research at Immersive Labs. He also added that the attacker can exploit all the above mentioned flaws without having a SureMDM account.

These vulnerabilities can be later combined to perform a supply chain attack when a user logs into their SureMDM account thus infecting and compromising all the managed devices in the network.

Mitigation for SureMDM security vulnerabilities

An additional authentication check for agents can be good for validating rogue agents, and can prevent them from being registered. However, it can’t prevent the agents spoofing though. For other flaws, ensure you have the updated agents for Linux and mac devices to patch the above mentioned flaws. You can also contact 42 Gears Support if you need clarification on the updated agents and the patch notes.

As on Jan 3rd, 42 Gears responded with an update that they were continuing to apply additional mitigation mentioned above and beyond those reported by Immersive Labs.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.

You can reach out to us via Twitter or Facebook, for any advertising requests.

Share the article with your friends


SureMDM security vulnerabilitiesSureMDM security vulnerability


Author

John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search