Sploit.io - Search

Product: w1200ex\/ms\/, version: <= *

CVE-2024-28009

Severity: CRITICAL

Description: Improper authentication vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN MR02LN, WG1810HP(JE) and WG1810HP(MF) all versions allows a attacker to execute an arbitrary command with the root privilege via the internet.

CVSS Score: N/A

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.000430000
  • Percentile: 0.111280000
  • Date: 2025-01-08

ExploitDB

No data available.

HackerOne Data

  • Rank: 7441
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • NEC Corporation WG1800HP4 - Versions: all versions
    • NEC Corporation WG1200HS3 - Versions: all versions
    • NEC Corporation WG1900HP2 - Versions: all versions
    • NEC Corporation WG1200HP3 - Versions: all versions
    • NEC Corporation WG1800HP3 - Versions: all versions
    • NEC Corporation WG1200HS2 - Versions: all versions
    • NEC Corporation WG1900HP - Versions: all versions
    • NEC Corporation WG1200HP2 - Versions: all versions
    • NEC Corporation W1200EX(-MS) - Versions: all versions
    • NEC Corporation WG1200HS - Versions: all versions
    • NEC Corporation WG1200HP - Versions: all versions
    • NEC Corporation WF300HP2 - Versions: all versions
    • NEC Corporation W300P - Versions: all versions
    • NEC Corporation WF800HP - Versions: all versions
    • NEC Corporation WR8165N - Versions: all versions
    • NEC Corporation WG2200HP - Versions: all versions
    • NEC Corporation WF1200HP2 - Versions: all versions
    • NEC Corporation WG1800HP2 - Versions: all versions
    • NEC Corporation WF1200HP - Versions: all versions
    • NEC Corporation WG600HP - Versions: all versions
    • NEC Corporation WG300HP - Versions: all versions
    • NEC Corporation WF300HP - Versions: all versions
    • NEC Corporation WG1800HP - Versions: all versions
    • NEC Corporation WG1400HP - Versions: all versions
    • NEC Corporation WR8175N - Versions: all versions
    • NEC Corporation WR9300N - Versions: all versions
    • NEC Corporation WR8750N - Versions: all versions
    • NEC Corporation WR8160N - Versions: all versions
    • NEC Corporation WR9500N - Versions: all versions
    • NEC Corporation WR8600N - Versions: all versions
    • NEC Corporation WR8370N - Versions: all versions
    • NEC Corporation WR8170N - Versions: all versions
    • NEC Corporation WR8700N - Versions: all versions
    • NEC Corporation WR8300N - Versions: all versions
    • NEC Corporation WR8150N - Versions: all versions
    • NEC Corporation WR4100N - Versions: all versions
    • NEC Corporation WR4500N - Versions: all versions
    • NEC Corporation WR8100N - Versions: all versions
    • NEC Corporation WR8500N - Versions: all versions
    • NEC Corporation CR2500P - Versions: all versions
    • NEC Corporation WR8400N - Versions: all versions
    • NEC Corporation WR8200N - Versions: all versions
    • NEC Corporation WR1200H - Versions: all versions
    • NEC Corporation WR7870S - Versions: all versions
    • NEC Corporation WR6670S - Versions: all versions
    • NEC Corporation WR7850S - Versions: all versions
    • NEC Corporation WR6650S - Versions: all versions
    • NEC Corporation WR6600H - Versions: all versions
    • NEC Corporation WR7800H - Versions: all versions
    • NEC Corporation WM3400RN - Versions: all versions
    • NEC Corporation WM3450RN - Versions: all versions
    • NEC Corporation WM3500R - Versions: all versions
    • NEC Corporation WM3600R - Versions: all versions
    • NEC Corporation WM3800R - Versions: all versions
    • NEC Corporation WR8166N - Versions: all versions
    • NEC Corporation MR01LN - Versions: all versions
    • NEC Corporation MR02LN - Versions: all versions
    • NEC Corporation WG1810HP(JE) - Versions: all versions
    • NEC Corporation WG1810HP(MF) - Versions: all versions

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability identified as CVE-2024-28009 is an improper authentication issue affecting multiple NEC Corporation Aterm router models. This flaw allows an attacker to execute arbitrary commands with root privileges via the internet. The CVSS v3.1 base score of 9.8 (CRITICAL) underscores the severity of this vulnerability, with high impacts on confidentiality, integrity, and availability.

    The nature of this vulnerability lies in its exploitation of weak or missing authentication mechanisms, enabling unauthorized access to critical system functions. The likelihood of exploitation is high due to the low attack complexity and the absence of required privileges or user interaction. Attackers can exploit this vulnerability remotely over the network, making it particularly dangerous for organizations using affected devices in their infrastructure.

    The business impact is significant, as successful exploitation could lead to complete system compromise, data breaches, service disruption, and potential lateral movement within the network. The ease of exploitation, combined with the high impact, makes this vulnerability a critical threat to organizations relying on these devices.

    2. Potential Attack Scenarios
    One potential attack scenario involves an attacker leveraging this vulnerability to gain root access to an affected router. The attack vector begins with the attacker scanning the internet for vulnerable NEC Aterm routers. Once identified, the attacker sends a specially crafted request to the router, bypassing authentication mechanisms.

    The attack process involves exploiting the improper authentication flaw to execute arbitrary commands with root privileges. For example, the attacker could install malicious firmware, exfiltrate sensitive data, or reconfigure the router to redirect traffic through a malicious server. The potential outcomes include a complete takeover of the router, interception of sensitive communications, and disruption of network services.

    In a more advanced scenario, the attacker could use the compromised router as a pivot point to move laterally within the network, targeting other critical systems and escalating the attack's impact. This could lead to widespread data breaches, ransomware deployment, or prolonged service outages.

    3. Mitigation Recommendations
    Immediate action is required to mitigate this vulnerability. Organizations using affected NEC Aterm routers should apply the latest firmware updates provided by NEC Corporation. These updates address the improper authentication issue and prevent exploitation.

    If a patch is not immediately available, organizations should implement network-level controls to restrict access to the affected devices. This includes configuring firewalls to block unauthorized internet access to the routers and enabling strong authentication mechanisms where possible.

    Additionally, organizations should monitor network traffic for unusual activity and consider replacing affected devices with models that are not vulnerable. Regularly reviewing and updating security configurations is essential to minimize the risk of similar vulnerabilities in the future.

    For further guidance, refer to the official NEC security advisory: https://jpn.nec.com/security-info/secinfo/nv24-001_en.html

    4. Executive Summary
    CVE-2024-28009 is a critical vulnerability affecting multiple NEC Aterm router models, allowing attackers to execute arbitrary commands with root privileges via the internet. This flaw poses a severe risk to organizations, with potential impacts including data breaches, service disruptions, and complete system compromise.

    The vulnerability is highly exploitable due to its low attack complexity and remote attack vector. Attackers can easily target affected devices, leading to significant business disruptions and reputational damage.

    To address this issue, organizations must immediately apply firmware updates from NEC Corporation and implement network-level controls to restrict access to vulnerable devices. Proactive monitoring and regular security reviews are also recommended to mitigate future risks.

    This vulnerability underscores the importance of maintaining up-to-date firmware and robust security configurations for network devices. Addressing this issue promptly is critical to safeguarding organizational assets and ensuring business continuity.