Sploit.io - Search

Product: w1200ex\/ms\/, version: < *

CVE-2024-28012

Severity: CRITICAL

Description: Improper authentication vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN MR02LN, WG1810HP(JE) and WG1810HP(MF) all versions allows a attacker to execute an arbitrary command with the root privilege via the internet.

CVSS Score: N/A

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.000430000
  • Percentile: 0.111280000
  • Date: 2025-01-08

ExploitDB

No data available.

HackerOne Data

  • Rank: 7441
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • NEC Corporation WG1800HP4 - Versions: all versions
    • NEC Corporation WG1200HS3 - Versions: all versions
    • NEC Corporation WG1900HP2 - Versions: all versions
    • NEC Corporation WG1200HP3 - Versions: all versions
    • NEC Corporation WG1800HP3 - Versions: all versions
    • NEC Corporation WG1200HS2 - Versions: all versions
    • NEC Corporation WG1900HP - Versions: all versions
    • NEC Corporation WG1200HP2 - Versions: all versions
    • NEC Corporation W1200EX(-MS) - Versions: all versions
    • NEC Corporation WG1200HS - Versions: all versions
    • NEC Corporation WG1200HP - Versions: all versions
    • NEC Corporation WF300HP2 - Versions: all versions
    • NEC Corporation W300P - Versions: all versions
    • NEC Corporation WF800HP - Versions: all versions
    • NEC Corporation WR8165N - Versions: all versions
    • NEC Corporation WG2200HP - Versions: all versions
    • NEC Corporation WF1200HP2 - Versions: all versions
    • NEC Corporation WG1800HP2 - Versions: all versions
    • NEC Corporation WF1200HP - Versions: all versions
    • NEC Corporation WG600HP - Versions: all versions
    • NEC Corporation WG300HP - Versions: all versions
    • NEC Corporation WF300HP - Versions: all versions
    • NEC Corporation WG1800HP - Versions: all versions
    • NEC Corporation WG1400HP - Versions: all versions
    • NEC Corporation WR8175N - Versions: all versions
    • NEC Corporation WR9300N - Versions: all versions
    • NEC Corporation WR8750N - Versions: all versions
    • NEC Corporation WR8160N - Versions: all versions
    • NEC Corporation WR9500N - Versions: all versions
    • NEC Corporation WR8600N - Versions: all versions
    • NEC Corporation WR8370N - Versions: all versions
    • NEC Corporation WR8170N - Versions: all versions
    • NEC Corporation WR8700N - Versions: all versions
    • NEC Corporation WR8300N - Versions: all versions
    • NEC Corporation WR8150N - Versions: all versions
    • NEC Corporation WR4100N - Versions: all versions
    • NEC Corporation WR4500N - Versions: all versions
    • NEC Corporation WR8100N - Versions: all versions
    • NEC Corporation WR8500N - Versions: all versions
    • NEC Corporation CR2500P - Versions: all versions
    • NEC Corporation WR8400N - Versions: all versions
    • NEC Corporation WR8200N - Versions: all versions
    • NEC Corporation WR1200H - Versions: all versions
    • NEC Corporation WR7870S - Versions: all versions
    • NEC Corporation WR6670S - Versions: all versions
    • NEC Corporation WR7850S - Versions: all versions
    • NEC Corporation WR6650S - Versions: all versions
    • NEC Corporation WR6600H - Versions: all versions
    • NEC Corporation WR7800H - Versions: all versions
    • NEC Corporation WM3400RN - Versions: all versions
    • NEC Corporation WM3450RN - Versions: all versions
    • NEC Corporation WM3500R - Versions: all versions
    • NEC Corporation WM3600R - Versions: all versions
    • NEC Corporation WM3800R - Versions: all versions
    • NEC Corporation WR8166N - Versions: all versions
    • NEC Corporation MR01LN - Versions: all versions
    • NEC Corporation MR02LN - Versions: all versions
    • NEC Corporation WG1810HP(JE) - Versions: all versions
    • NEC Corporation WG1810HP(MF) - Versions: all versions

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability identified as CVE-2024-28012 is an improper authentication issue affecting multiple NEC Corporation Aterm router models. This flaw allows an attacker to execute arbitrary commands with root privileges via the internet. The CVSS v3.1 base score of 9.8 (CRITICAL) underscores the severity of this vulnerability, with high impacts on confidentiality, integrity, and availability.

    The nature of this vulnerability lies in its exploitation of weak or missing authentication mechanisms, enabling unauthorized access to critical system functions. The likelihood of exploitation is high due to the network-based attack vector, low attack complexity, and the absence of required privileges or user interaction. Attackers can exploit this vulnerability remotely, making it particularly dangerous for organizations using affected devices.

    The business impact is significant. If exploited, attackers could gain full control over the affected routers, leading to potential data breaches, network disruptions, or the deployment of malicious payloads. This could result in operational downtime, reputational damage, and financial losses. The vulnerability's criticality is further amplified by its potential use in ransomware campaigns or as part of a larger attack chain.

    2. Potential Attack Scenarios
    One potential attack scenario involves an attacker exploiting the vulnerability to gain root access to an affected router. The attack begins with the attacker scanning the internet for vulnerable NEC Aterm routers. Once identified, the attacker sends a specially crafted request to the router, bypassing authentication mechanisms. This request allows the execution of arbitrary commands with root privileges.

    The attacker could then install malware, modify router configurations, or exfiltrate sensitive data. For example, the attacker might redirect network traffic through a malicious server, enabling man-in-the-middle attacks or credential theft. Alternatively, the attacker could deploy ransomware, encrypting critical data and demanding payment for decryption. The outcome could include prolonged network outages, data breaches, and significant financial and reputational damage to the affected organization.

    3. Mitigation Recommendations
    Immediate action is required to mitigate this vulnerability. Organizations using affected NEC Aterm routers should apply the latest firmware updates provided by NEC Corporation. These updates address the improper authentication issue and prevent exploitation.

    If a patch is not immediately available, organizations should implement compensating controls. These include restricting access to the router's management interface to trusted IP addresses, disabling remote management features, and monitoring network traffic for unusual activity. Additionally, organizations should review and strengthen authentication mechanisms, ensuring the use of strong, unique passwords and multi-factor authentication where possible.

    For further guidance, refer to NEC Corporation's security advisory at https://jpn.nec.com/security-info/secinfo/nv24-001_en.html. Regular monitoring of vendor updates and security bulletins is also recommended to stay informed about new patches or mitigation strategies.

    4. Executive Summary
    CVE-2024-28012 is a critical vulnerability affecting multiple NEC Aterm router models, allowing attackers to execute arbitrary commands with root privileges via the internet. This flaw poses a significant risk to organizations, with potential impacts including data breaches, network disruptions, and financial losses.

    The vulnerability is highly exploitable due to its network-based attack vector and low complexity. Attackers can exploit it remotely without requiring user interaction or privileges, making it a prime target for malicious actors. Immediate action is essential to mitigate the risk.

    Organizations should apply the latest firmware updates from NEC Corporation and implement compensating controls such as restricting access to management interfaces and monitoring network traffic. Addressing this vulnerability promptly is critical to safeguarding business operations, protecting sensitive data, and maintaining customer trust. The potential consequences of inaction are severe, underscoring the urgency of implementing recommended mitigation measures.