Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


1 Battle Camp S1: Reality Rivalries with Dana Moon & QT 1:00:36
Hard-Coded Havoc: The Fatal Flaws in Planet’s Network Devices
Manage episode 479696415 series 3645080
A wave of critical vulnerabilities in Planet Technology’s industrial switches and network management systems could let attackers hijack devices, steal data, and sabotage industrial networks—with no credentials required.
In this urgent episode, we dissect:
🔓 The 5 worst flaws (CVSS 9.3+)—from hard-coded database passwords to pre-auth command injection—discovered by Immersive Labs’ Kev Breen.
🏭 Why factories and critical infrastructure are prime targets: These switches are widely used in manufacturing, energy, and OT environments.
💻 How hackers exploit them:
- MongoDB exposed? Default creds (planet:123456) let attackers dump configs.
- Bypass auth entirely with a malformed URL parameter (/dispatcher.cgi?cmd=532&ip_URL=;).
- Intercept device communications due to hard-coded keys.
🛡️ CISA’s emergency advisory (ICSA-25-114-06)—and why patching WGS, NMS, and UNI-NMS devices is non-negotiable.
🔍 The researcher’s journey: How a home lab, firmware analysis, and a lucky accident uncovered these flaws.
If your network relies on Planet Technology switches, this episode is a wake-up call. Tune in before attackers beat you to the patch.
81 episodes
Manage episode 479696415 series 3645080
A wave of critical vulnerabilities in Planet Technology’s industrial switches and network management systems could let attackers hijack devices, steal data, and sabotage industrial networks—with no credentials required.
In this urgent episode, we dissect:
🔓 The 5 worst flaws (CVSS 9.3+)—from hard-coded database passwords to pre-auth command injection—discovered by Immersive Labs’ Kev Breen.
🏭 Why factories and critical infrastructure are prime targets: These switches are widely used in manufacturing, energy, and OT environments.
💻 How hackers exploit them:
- MongoDB exposed? Default creds (planet:123456) let attackers dump configs.
- Bypass auth entirely with a malformed URL parameter (/dispatcher.cgi?cmd=532&ip_URL=;).
- Intercept device communications due to hard-coded keys.
🛡️ CISA’s emergency advisory (ICSA-25-114-06)—and why patching WGS, NMS, and UNI-NMS devices is non-negotiable.
🔍 The researcher’s journey: How a home lab, firmware analysis, and a lucky accident uncovered these flaws.
If your network relies on Planet Technology switches, this episode is a wake-up call. Tune in before attackers beat you to the patch.
81 episodes
All episodes
×
1 Chrome's New Vulnerability CVE-2025-4664: A Security Flaw That Can Lead to Account Takeover 9:19

1 Scattered Spider Targets UK and US Retailers: The Growing Threat to Major Brands 11:52

1 Proofpoint Acquires Hornetsecurity for $1B: A New Era in Microsoft 365 Security 10:18

1 Exploited in the Wild: SAP NetWeaver Zero-Days Hit Fortune 500 22:55

1 Checkout Chaos: Inside the £3.5 Million-a-Day M&S Cyber-Shutdown 16:19

1 Targeted iOS Attacks: The Zero-Days Apple Had to Patch Fast 10:09

1 Texas vs Google: The $1.4 Billion Wake-Up Call for Data Privacy Violations 10:35

1 Marbled Dust's Zero-Day Exploit: Unveiling a Türkiye-linked Espionage Campaign Against Kurdish Forces 9:40

1 TeleMessage Exploit: Inside the Messaging Flaw That Hit Coinbase and CBP 14:14

1 Backdoored by ‘Cheap’ AI: How Fake npm Packages Compromised Cursor IDE 25:18

1 160,000 Victims Later: The Aspire USA Breach Under Valsoft’s Watch 9:23

1 rand-user-agent: The NPM Package That Opened a Backdoor 15:04

1 PipeMagic, Procdump, and Privilege Escalation: Tracking the Windows CLFS Exploit Chain 19:21

1 Pegasus Spyware, WhatsApp v. NSO Group, and the Global Battle for Data Privacy 21:26

1 How CodeAnt AI is Automating Code Reviews for 50+ Dev Teams 17:37

1 The Langflow Breach: How a Popular AI Tool Opened the Door to Hackers 13:22

1 Mirai Reloaded: Why CVE-2024-7399 Still Haunts Samsung Servers 14:26

1 CVE-2025-31324: A Critical SAP Zero-Day in Active Exploitation 12:13

1 Another Day, Another Commvault Zero-Day: RCE, Path Traversal, and KEV Inclusions 12:00

1 Kelly Benefits Breach: What 413,000 Exposed Records Teach Us About Cybersecurity 13:31

1 $491M Budget Cut: The White House Move That Could Reshape CISA 18:57

1 TikTok Fined €530M: GDPR Breach Over Data Transfers to China 20:39

1 Endor Labs Raises $93M to Cut AppSec Noise and Secure the Software Supply Chain 12:14

1 CVE-2025-3928: How One Vulnerability Breached Commvault’s Azure Stack 14:03

1 Nova Scotia Power, a Canadian Utility, Breached: A Global Warning for Critical Infrastructure 11:46

1 SentinelOne Discloses Ongoing Attacks by Nation-State Hackers and Ransomware Gangs 10:50

1 OpenEoX and the Future of End-of-Life Standardization in IT 12:01

1 LayerX Secures $45M Total to Battle Data Leaks, One Browser at a Time 24:46

1 $10.5M to Fight AI-Phishing: The Rise of Pistachio’s Cybersecurity Training Platform 13:04

1 AirBorne: How a Zero-Click Bug Threatens Millions of Apple and Third-Party Devices 14:23
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.