CVE-2024-28005
CVE-2024-28005: A vulnerability exists in multiple Aterm router models, allowing attackers with high privileges to execute arbitrary scripts. This code execution flaw affects a wide range of Aterm devices, potentially compromising network security. The CVSS score of 4.7 indicates a medium severity, but the SOCRadar Vulnerability Risk Score (SVRS) is 30, suggesting a lower immediate risk compared to highly critical vulnerabilities. Although the CVSS score is moderate and the SVRS score is low, administrators should still apply necessary patches and updates to mitigate potential exploitation. Successful exploitation could lead to unauthorized access, data breaches, and further compromise of connected devices. This vulnerability highlights the importance of robust security practices, including regular security audits and timely patching, to protect against potential threats. While not immediately critical based on the SVRS, proactive measures are recommended.
Description
CVE-2024-28005 is a vulnerability in Aterm devices that allows an attacker with high privileges to execute arbitrary scripts. The SVRS for this vulnerability is 30, indicating a moderate risk.
Key Insights
- The vulnerability can be exploited by an attacker who has obtained high privileges on the device.
- The attacker can execute arbitrary scripts on the device, which could allow them to take control of the device or access sensitive data.
- The vulnerability affects multiple models of Aterm devices, including the WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN MR02LN, WG1810HP(JE) and WG1810HP(MF).
Mitigation Strategies
- Update the firmware on the device to the latest version.
- Disable remote management of the device.
- Change the default password for the device.
- Monitor the device for suspicious activity.
Additional Information
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.