Internal Pentest
Penetration Testing Report – MultiTech Conduit AP Gateway (MTCAP)
Device Tested: MultiTech Conduit AP LoRaWAN Gateway – SIM-Enabled Model (MTCDT Series)
Test Date: 22/10/2024
Tested By: MFC Safe
Executive Summary
This report summarizes the results of penetration testing performed on the MultiTech MTCAP gateway. The evaluation focused on physical security, network access control, firmware protection, authentication, and LoRaWAN data handling. The device was found to exhibit a strong security posture with minor medium-risk concerns around physical port access and password policy enforcement.
Physical Port Access
USB/serial interfaces exposed
Low
Firmware Protection
Verified firmware signing/encryption
Low
Web Interface Security
Login required, CSRF patches applied
Low
Network Exposure
Port filtering and firewall effective
Low
Authentication & Access
Credentials enforced, weak policy
Low
OTA Updates
Encrypted OTA supported
Low
LoRaWAN Packet Handling
AES-128 encryption, packet integrity OK
Low
CVE Assessment
No exploitable known CVEs found
Low
Test Details & Findings
1. Physical Port Security
Finding: Serial and USB debug ports exposed.
Impact: Allows local tampering or data interception.
Recommendation: Restricted physical access, Disable or seal ports in production.
Risk: Low
2. Firmware Security
Finding: Firmware requires signature validation to install.
Result: No bypass vulnerabilities discovered.
Risk: Low
3. Web Admin Panel
Finding: Login page protected with HTTPS; CSRF mitigated.
Result: Login brute-force protection limited.
Recommendation: Enforce stronger password policies.
Risk: Low–Medium
4. Network Exposure & Firewall
Finding: Default services limited to SSH and HTTPS.
Result: Open port scan revealed no exposed insecure services.
Risk: Low
5. Authentication and Credential Storage
Finding: Restricted physical access, password hashing in place, but minimum complexity requirements not enforced by default.
Risk: Low
6. OTA Update Mechanism
Finding: OTA updates over HTTPS with signature validation.
Risk: Low
7. LoRaWAN Data Handling
Finding: End-to-end AES-128 encryption supported and validated.
Risk: Low
8. Vulnerability Assessment
Finding: Checked against recent CVEs; no known issues affecting this model.
Risk: Low
Recommendations
Harden physical device access in deployment locations.
Enforce password rotation and complexity standards.
Update firmware regularly in line with MultiTech advisories.
Conclusion
The MultiTech Conduit AP Gateway demonstrates solid performance in all assessed security domains. The primary concerns are physical and password-related, which are manageable with appropriate deployment controls. This device is fit for use in regulated and secure environments.
This document is prepared for internal security review and/or client assurance reporting.
Last updated
Was this helpful?
