On march 30, 2022, SentineOne announced their findings about Microsoft Azure Defense for IoT including a detail of a handful of bugs and two critical remote code execution vulnerabilities. Furthermore, they also pointed out that these security flaw would take six months to address and it meant that these ones could have been exploited by an unauthenticated attacker to compromise and would take over critical infrastructure networks. The two of the critical bugs in Defender for IoT are: CVE-2021-42311 and CVE-2021-42313. These bugs are SQL injection vulnerabilities and received 10/10 score in term of severity. Attackers could exploit these bugs without any authentication . Below is the link to get more info about these bugs.
https://www.theregister.com/2022/03/30/sentinelone_microsoft_azure_iot/
The University of Oxford and Armasuisse S+T have discovered that a method dubbed “Brokenwire” interferes with the control communications that take place between the vehicle and the charger. Here are the details of a new attack technique against the popular Combined Charging System (CCS) that can disrupt the ability of electric vehicles to charge from a distance of up to 47m (151ft). Brokenwire causes the charging process to stop unexpectedly by transmitting malicious electromagnetic signals. Attacks can use various combinations of off-the-shelf components, such as software-defined radios, power amplifiers, and dipole antennas.
Brokenwire could have a direct impact on the 12 million battery-electric vehicles on the world’s roads, as well as a profound impact on a new wave of fleet electrification for private businesses and key public services. Also, not only would this be an inconvenience to individuals, interruptions to the charging of critical vehicles such as electric ambulances could be life-threatening.
Link: https://thehackernews.com/2022/04/brokenwire-hack-could-let-remote.html
Yangyuan Lin