Learn about CVE-2022-34769 impacting PROSCEND and ADVICE Industrial Cellular Routers, allowing unauthenticated OS command injection. Mitigation steps and update details provided.
This article provides an overview of CVE-2022-34769, a vulnerability in PROSCEND and ADVICE Industrial Cellular Routers that allows unauthenticated OS command injection.
Understanding CVE-2022-34769
CVE-2022-34769 is a medium-severity vulnerability affecting various versions of PROSCEND Industrial Cellular Routers, which can be exploited for unauthenticated OS command injection.
What is CVE-2022-34769?
The vulnerability in PROSCEND and ADVICE Industrial Cellular Routers allows attackers to execute operating system commands without authentication. This can lead to unauthorized access and control over the affected devices.
The Impact of CVE-2022-34769
With a CVSS base score of 6.5 out of 10, CVE-2022-34769 poses a medium-severity risk. Attackers can exploit this vulnerability to compromise the integrity and availability of the affected routers.
Technical Details of CVE-2022-34769
CVE-2022-34769 is characterized by a low attack complexity and vector, with low impacts on confidentiality, integrity, and availability. The vulnerability requires low privileges and no user interaction for exploitation, affecting adjacent network scope.
Vulnerability Description
The vulnerability allows unauthenticated OS command injection in PROSCEND and ADVICE Industrial Cellular Routers, potentially leading to unauthorized system access and control.
Affected Systems and Versions
Versions affected include PROSCEND M330-w / M330-W5 (until V1.11*), M350-5G / M350-W5G / M350-6 / M350-W6 (until V1.02*), M301-G / M301-GW (until V2.20*), and ADVICE ICR 111WG (until V1.11*).
Exploitation Mechanism
Attackers can exploit this vulnerability in adjacent network environments to execute unauthorized OS commands, impacting the changed scope of the affected systems.
Mitigation and Prevention
To address CVE-2022-34769, immediate steps should be taken along with long-term security practices and timely patching.
Immediate Steps to Take
Users should apply the updates released by PROSCEND for the affected versions to mitigate the vulnerability. Quick action is recommended to prevent potential exploitation.
Long-Term Security Practices
Implementing network segmentation, strong access controls, and regular security audits can help enhance the overall security posture and prevent similar vulnerabilities.
Patching and Updates
Update details: