Severity: Unknown
Description: Phicomm k2 v22.6.529.216 was discovered to contain a command injection vulnerability via the function luci.sys.call.
CVSS Score: N/A
D
No data available.
No data available.
1. Risk Assessment
The vulnerability CVE-2023-40796 is a command injection vulnerability present in the Phicomm k2 firmware version 22.6.529.216, specifically within the luci.sys.call function. Command injection vulnerabilities occur when an application allows an attacker to execute arbitrary system commands. This is a significant risk because it allows an attacker to potentially gain full control of the affected device. The EPSS score of 0.001100000 indicates a relatively low, but not negligible, probability of exploitation. The ease of exploitation is considered moderate, requiring a proof-of-concept (POC) exploit, but not necessarily being easily automatable. The business impact can range from moderate to high depending on the role of the Phicomm k2 device within the organization. A successful exploit could lead to a compromise of confidentiality, integrity, and availability. Confidentiality can be compromised if sensitive data is stored on the device or can be accessed through the device. Integrity can be compromised if the attacker modifies system configurations or data. Availability can be compromised if the attacker crashes the device or disrupts its normal operation.
2. Potential Attack Scenarios
An attacker with network access to the Phicomm k2 device can leverage the command injection vulnerability to execute arbitrary commands. For example, an attacker could craft a malicious input through a web interface that utilizes the luci.sys.call function. This input could be designed to execute a command to download and execute a reverse shell, allowing the attacker to gain remote access to the device. The attack vector is network-based, and the attack process involves sending a specially crafted request to the device. The potential outcome is full control of the device, allowing the attacker to steal data, modify configurations, or use the device as a pivot point to attack other systems on the network. Another scenario could involve the attacker using the command injection to add a new administrator account with full privileges, granting persistent access.
3. Mitigation Recommendations
The primary mitigation recommendation is to upgrade the Phicomm k2 firmware to a version that addresses the vulnerability. Check the Phicomm website for the latest firmware release. In the interim, if upgrading is not immediately possible, consider network segmentation to limit the blast radius of a potential compromise. Monitor network traffic for suspicious activity originating from the Phicomm k2 device. Additionally, review and restrict access to the web interface, ensuring only authorized users have access. Employ strong authentication mechanisms such as multi-factor authentication, if supported. Regularly review logs for any unusual system calls originating from the luci.sys.call function. Refer to the GitHub repository for additional details and potential POC exploits: https://github.com/lst-oss/Vulnerability/tree/main/Phicomm/k2.
4. Executive Summary
CVE-2023-40796 is a command injection vulnerability affecting Phicomm k2 devices running firmware version 22.6.529.216. This vulnerability allows an attacker to execute arbitrary commands on the device, potentially leading to full system compromise. While the probability of exploitation is relatively low, the potential impact on confidentiality, integrity, and availability is significant. It’s important to upgrade the firmware to the latest version to mitigate this risk. If an immediate upgrade isn't possible, network segmentation and monitoring are key interim steps. Addressing this vulnerability is crucial for protecting sensitive data and ensuring the reliable operation of the Phicomm k2 device, preventing potential disruptions to business operations and minimizing the risk of a wider network compromise.