#VU12660 Authentication bypass in GPON


Published: 2020-03-18 | Updated: 2021-06-17

Vulnerability identifier: #VU12660

Vulnerability risk: Critical

CVSSv3.1: 9.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C]

CVE-ID: CVE-2018-10561

CWE-ID: CWE-592

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
GPON
Hardware solutions / Routers for home users

Vendor: Dasan Networks

Description
The vulnerability allows a remote attacker to bypass authentication on the target system.

The weakness exists due to improper authentication restrictions. A remote attacker can bypass authentication simply by appending "?images" to any URL of the device that requires authentication, as demonstrated by the /menu.html?images/ or /GponForm/diag_FORM?images/ URI.

Note: the vulnerability is being exploited by various attachers to deliver several Mirai variants (e.g., Satori, JenX, etc.).

Mitigation
Install update from vendor's website.

Vulnerable software versions

GPON: All versions


External links
http://www.vpnmentor.com/blog/critical-vulnerability-gpon-router/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.


Latest bulletins with this vulnerability