Important Security Notice for Nova 227/233/243/246

There have been several reports since Sunday (12/20/20) of eNBs becoming inaccessible and not passing any user traffic. These impacted eNBs also appear to not be passing any user traffic (despite the OMC showing the eNB as active and with UEs attached). Opening the eNB webGUI will result in an error message and SSH connections will frequently close. When connected via SSH, the admin user will have no permission to execute any commands.

It has been determined that the cause is due to the eNBs being hacked directly. In most cases, the impacted eNBs had their management ports exposed to the outside world. It also appears that the hacked eNBs are scanning the local network for other eNBs to infect. At this time, only the eNBs running RTS and RTD software (all version) appear to be at risk.

For eNBs that have been hacked, there is currently two recovery methods available:

  1. Create software rollback task from the OMC. To perform this step (from OMC), go to eNB>Maintenance>Software Rollback page, then click the Add (+) button and select the appropriate eNBs and click OK to initiate the software rollback task. The task will eventually display a “failed” status, but the backend system rollback commands did take place. The reason the task lists as failed is due to the reboot command not executing. This means you will still need to power cycle the eNB to bring it back up.

  2. Perform software rollback from eNB serial port. If the eNB was rebooted or is not connected to the OMC, the only remaining option is to perform a software rollback from the serial port, which can only be accessed by opening the eNB chassis. Access to the serial port will also require a RS232 to TTL adapter. Detailed instructions can be provided by reaching out to support at support_na@baicells.com.

Upon software rollback, priority should be placed on upgrading the eNB software and blocking public access to the eNB management ports, as well as locally infected eNBs, to avoid repeated hacks. Performing a software upgrade will overwrite the secondary software bank which was hacked. As to the recovery recommendation, the safest approach would be to rollback all eNBs at once and after power cycling them, to disable the Ethernet port which they are connected to and only bring the port up upon all hacked eNBs being recovered or powered off as well as the network being secured. You will want to change your passwords afterwards as well of course.

While we don’t yet know where the exact vulnerability is, the common belief is that the hack occurred over HTTP, especially with SSH listening on a non-standard port. As we learn more about the nature of the hack and where the exact vulnerabilities are, we will provide another update along with a software patch. In the meantime and especially if there is risk of management ports being exposed, it is suggested to disable HTTP/HTTPs access from the WAN interface. This can be disabled on the Network>WAN/LAN/VLAN by setting Allow management access over WAN to Disable. Once disabled, the webGUI can only be accessed via the LAN IP. The eNB would still be managed from the OMC.

For those looking to restrict outbound traffic to CloudCore, outbound access to the following is required for all managed devices. Note that the cloud server IP addresses are currently not static which is why FQDN names are being listed instead. This is something we are currently reviewing and will likely be switching to static IPs in the near future.

Cloud OMC

Cloud EPC

Last Update: 12/22/20 12:35PM CT

Have updated the post with some additional recommendations. For those looking for instructions to access the eNB serial port, please reach out to the support team.

When can we expect another update on this? Has the vulnerability been patched? Can you post a post-mortem on how the attackers were able to gain access? I worry about putting more Baicells eNBs on our network in case our firewall rules don’t get updated and we have another eNB get taken offline.

The vulnerabilities were found to be with the embedded web server and only the single carrier eNBs running RTS software were impacted. The best solution of course would be to not expose the eNB management ports to the public.

As for the vulnerability patch, this is included in RTS 3.7.8.1 which will be released as beta at end of this week.

Any update? It’s been three weeks and we don’t see that release listed for download.

Now four weeks.

Folks, the lack of any sense of urgency in fixing a critical security issue speaks volumes about what’s happening behind the scenes at Baicells, and doesn’t exactly inspire trust in your organization. Can someone please provide an update on this?

RTS & RTD 3.7.8.1 beta has been posted.