SB2024040523 - Multiple vulnerabilities in NEC Aterm series



SB2024040523 - Multiple vulnerabilities in NEC Aterm series

Published: April 5, 2024

Security Bulletin ID SB2024040523
Severity
Medium
Patch available
YES
Number of vulnerabilities 12
Exploitation vector Adjecent network
Highest impact Code execution

Breakdown by Severity

Medium 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 12 secuirty vulnerabilities.


1) Incorrect permission assignment for critical resource (CVE-ID: CVE-2024-28005)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to incorrect permission assignment for critical resource. A remote user on the local network can execute a shell with the root privilege.


2) Information disclosure (CVE-ID: CVE-2024-28006)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to exposure of sensitive system information to an unauthorized control sphere. A remote attacker on the local network can gain unauthorized access to sensitive information on the system.


3) Incorrect permission assignment for critical resource (CVE-ID: CVE-2024-28007)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to incorrect permission assignment for critical resource. A remote user on the local network can execute a shell with the root privilege.


4) Active Debug Code (CVE-ID: CVE-2024-28008)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the active debug code issue. A remote user on the local network can perform an unintended operation.


5) Use of Weak Credentials (CVE-ID: CVE-2024-28009)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to weak credentials. A remote attacker on the local network can guess the ID and password, and log in to telnet service.


6) Use of Weak Credentials (CVE-ID: CVE-2024-28012)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to weak credentials. A remote attacker on the local network can guess the ID and password, and log in to telnet service.


7) Use of hard-coded credentials (CVE-ID: CVE-2024-28010)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to presence of hard-coded credentials in application code. A remote attacker on the local network can guess the ID and password, and log in to telnet service.


8) Input validation error (CVE-ID: CVE-2024-28011)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to inclusion of undocumented features. A remote attacker on the local network can access telnet service unlimitedly.


9) Insufficient Session Expiration (CVE-ID: CVE-2024-28013)

The vulnerability allows a remote attacker compromise the target system.

The vulnerability exists due to insufficient session expiration issue. A remote attacker on the local network can alter the device settings without logging in.


10) Buffer overflow (CVE-ID: CVE-2024-28014)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error. A remote attacker on the local network can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


11) OS Command Injection (CVE-ID: CVE-2024-28015)

The vulnerability allows a remote user to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation in the web management console. A remote administrator can pass specially crafted data to the application and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


12) Information disclosure (CVE-ID: CVE-2024-28016)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. A remote attacker on the local network can gain unauthorized access to sensitive information on the system.


Remediation

Install update from vendor's website.