🕳️ Vulnerabilities & CVEs

Rapid7 Cracks Open Cellular IoT: No Tamper Protections on Any Tested Device

Zero cellular IoT devices in Rapid7's tests had tamper protections. That's right—none. Attackers with a screwdriver can pivot straight to your cloud.

Hacker soldering PCB on cellular IoT device to reroute traffic to cloud

⚡ Key Takeaways

  • Zero tested cellular IoT devices had tamper protections, exposing UART/USB for easy hijacks. 𝕏
  • Attackers use AT commands and PCB mods to pivot from device to cloud via proxies and scanners. 𝕏
  • Fixes demand end-to-end encryption, interface disabling, and APN monitoring—vendors must step up. 𝕏
Published by

CVE Watch

Threat intelligence. Zero noise.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Rapid7 Blog

Stay in the loop

The week's most important stories from CVE Watch, delivered once a week.