We just released a new version of R-SeeNet, which fixes an SQL injection vulnerability and also the SNMP trap processing for ICR-1601. We encourage all R-SeeNet users to upgrade.
R-SeeNet is the software system used for remote monitoring of Advantech cellular routers. For more information, please see the R-SeeNet website.
Another firmware version is released.
Being a patchlevel release it brings mainly a number of improves and updates. There are no security fixes in this version.
A few highlight points from 6.2.6 (as always, you are welcome to check out the Release notes):
We released a user module with NetFlow/IPFIX probe and collector. The module captures a source and a destination IP address of each observed network communication and the amount of data exchanged. This can be used by network monitors such as PRTG to identify unusual traffic flows caused by misconfigurations, security incidents or policy violations.
Detailed description of the module configuration and operation can be found in the NetFlow/IPFIX Application Note.
The User Modules can be downloaded here.
Our cellular routers are not affected by the Ripple20 vulnerabilities discovered in a TCP/IP software library of many IoT devices.
Another firmware version is out!
Being a patchlevel release it brings mainly a number of fixes. This includes security fixes for 1 medium severity vulnerability.
A few highlight points from 6.2.5 (as always, you are welcome to check out the Release notes):
For details regarding distributed firmware versions per particular router module have a look into Firmware Distribution Overview.
Last firmware version could always ...
In our efforts to further enhance security of our products we just released Security Guidelines. This Application Note provides recommendations for securing a cellular router and keeping it secure during installation, operation, maintenance and decommissioning. We aim at further improving this document, so please let us know in what security aspects you need additional guidance.
Another firmware version is out!
Being a patchlevel release it brings mainly a number of fixes. This includes security fixes for 4 critical, 3 high severity and 7 medium severity vulnerabilities.
A few highlight points from 6.2.4 (as always, you are welcome to check out the Release notes):
After the initial release of WebAccess/VPN last year and a patchlevel 1.0.1 version we follow with a minor release 1.1.0.
The WebAccess/VPN is a VPN management solution - a tool that can help you setup and organize secure network (or multiple secure networks) of routers and devices connected to the routers. You can read introductory information at WebAccess/VPN page and also follow to more documentation describing system principles, operation and usage.
The 1.1.0 release brings several improvements. For details, please check out 1.1.0 release notes, the following is just ...
Our cellular routers are not affected by the Kr00k vulnerability because the hardware is not based on Broadcom or Cypress Wi-Fi chips.
After a few months, another firmware version is out!
Being a patchlevel release it sports a number of fixes.
Before getting to the highlights, there is one thing to mention first.
Based on repeated requests from customers, we have decided to change the archive format for firmware files from tar to zip. The content of the archive file stays the same.
A few highlight points from 6.2.3 (as always, you are welcome to check out the Release notes):