CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-28013

Medium Severity
SVRS
30/100

CVSSv3
5.3/10

EPSS
0.00137/1

CVE-2024-28013: Insufficient Randomness in NEC Aterm Routers exposes them to remote configuration changes. This vulnerability affects numerous NEC Aterm router models allowing attackers to potentially alter settings over the internet due to the insufficiently random values used. The vulnerability, while having a moderate CVSS score of 5.3, has a low SOCRadar Vulnerability Risk Score (SVRS) of 30 indicating it is not currently considered a widespread or critical threat, but should still be monitored. Remote attackers can exploit this weakness to modify router settings. This poses risks such as DNS hijacking, traffic redirection, and other malicious activities. While not immediately critical based on the SVRS, patching is advisable to mitigate potential future exploitation and maintain network security. The sheer number of affected models highlights the potential impact if actively exploited.

No tags available
CVSS:3.1
AV:N
AC:L
PR:N
UI:N
S:U
C:N
I:L
A:N
2024-03-28

2025-01-14
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-28013 is a Use of Insufficiently Random Values vulnerability affecting various NEC Corporation wireless routers. This vulnerability allows an attacker to change settings via the internet. The SVRS for this CVE is 30, indicating a moderate level of risk.

Key Insights

  • Remote Exploitation: This vulnerability can be exploited remotely, allowing attackers to change router settings without physical access.
  • Impact on Network Security: By changing router settings, attackers can potentially compromise the security of the entire network, including connected devices and data.
  • Potential for Denial of Service: Attackers could exploit this vulnerability to disrupt network connectivity, causing denial of service for users.

Mitigation Strategies

  • Apply Firmware Updates: Install the latest firmware updates from NEC Corporation to patch the vulnerability.
  • Disable Remote Management: If possible, disable remote management features on the router to prevent unauthorized access.
  • Use Strong Passwords: Set strong and unique passwords for the router's administrative interface.
  • Monitor Network Traffic: Regularly monitor network traffic for suspicious activity that may indicate exploitation attempts.

Additional Information

  • Threat Actors/APT Groups: No specific threat actors or APT groups have been identified as actively exploiting this vulnerability.
  • Exploit Status: Active exploits have not been published.
  • CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has not issued a warning for this vulnerability.
  • In the Wild: This vulnerability is not currently known to be actively exploited by hackers.

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

No news found for this CVE

Social Media

No tweets found for this CVE

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://https://jpn.nec.com/security-info/secinfo/nv24-001_en.html
AF854A3A-2127-422B-91AE-364DA2661108https://https://jpn.nec.com/security-info/secinfo/nv24-001_en.html
[email protected]https://jpn.nec.com/security-info/secinfo/nv24-001_en.html

CWE Details

CWE IDCWE NameDescription
CWE-330Use of Insufficiently Random ValuesThe software uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence