SHARE
Facebook X Pinterest WhatsApp

Millions of Thales Wireless IoT Modules Vulnerable to Attack

thumbnail
Millions of Thales Wireless IoT Modules Vulnerable to Attack

IoT devices like insulin pumps and smart meters could be compromised.

Written By
thumbnail
Sue Walsh
Sue Walsh
Sep 13, 2020

IBM’s X-Force Red team has revealed a vulnerability in millions of Thales Wireless IoT modules that could put devices like insulin pumps and smart meters at risk. IBM announced its discovery once Thales had produced a patch and fixed as many devices as possible. The company delivered software fixes in Q1/2020 after contacting and discussing the issue with affected customers.

“This vulnerability could enable attackers to compromise millions of devices and access the networks or VPNs supporting those devices by pivoting onto the provider’s backend network,” Adam Laurie, X-Force Red’s lead hardware hacker, and Grzegorz Wypych, senior security consultant, write. “In turn, intellectual property, credentials, passwords, and encryption keys could all be readily available to an attacker.”

In addition to its discovery last year in Thales’ Cinterion EHS8 M2M modules, the CVE-2020-15858 vulnerability appeared in related products including:

  • BGS5
  • EHS5/6/8
  • PDS5/6/8
  • ELS61
  • ELS81
  • PLS62

The healthcare, telecommunications, energy, and automotive industries rely on IoT devices that use these modules.

See also: Researchers Sound Alarms About IoT Security

Securing Wireless IoT Modules

The IBM team discovered that the vulnerability led to modules gaining full read/write and delete access in what should be a restricted area. This critical issue had potential to allow serious attacks where hackers could:

  • Reprogram insulin pumps to overdose patients
  • Brick smart meters
  • Clone affected devices or modify their functionality

“Using information stolen from the modules, malicious actors can potentially control a device or gain access to the central control network to conduct widespread attacks – even remotely via 3G in some cases,” IBM says.

Advertisement

Challenges to Resolving the Vulnerability

Although Thales says that users can install their patch over the air (OTA) or via USB, IBM says it’s not quite that easy:

“The patching process for this vulnerability is completely dependent on the manufacturer of the device and its capabilities – for example, whether the device has access to the internet could make it complicated to work with,” IBM says.

Significantly regulated devices present additional difficulties. Industrial or medical controls that need a patch may then require time-intensive recertification.

IBM commended Thales for their handling of the flaw. Thales spent “significant time working with customers to ensure they were aware of the patches and taking steps to secure their users.”

thumbnail
Sue Walsh

Sue Walsh is News Writer for RTInsights, and a freelance writer and social media manager living in New York City. Her specialties include tech, security and e-commerce. You can follow her on Twitter at @girlfridaygeek.

Recommended for you...

New Frontiers of IAM: Reaching Great Heights with 2024 Trends
Ronak D. Jain
May 22, 2024
Application Security for IoT: 10 Best Practices
Sagar Nangare
Feb 21, 2023
The Importance of Ensuring IoT System Security
Is Nanotechnology Ready to Enter the IoT Security War?
Bernard Brode
Apr 12, 2022

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.