Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2022-36310 : What You Need to Know

Discover the details of CVE-2022-36310, a vulnerability in Airspan AirVelocity software allowing unauthorized command execution. Learn about the impact, affected systems, and mitigation steps.

Airspan AirVelocity 1500 software prior to version 15.18.00.2511 had a vulnerability that allowed an attacker to execute commands as root on the eNodeB. Here is what you need to know about CVE-2022-36310.

Understanding CVE-2022-36310

This section provides insights into the nature and impact of CVE-2022-36310.

What is CVE-2022-36310?

CVE-2022-36310 is a vulnerability in Airspan AirVelocity 1500 software that enables an attacker with SNMP write abilities to execute commands as root on the eNodeB. This vulnerability could potentially impact other AirVelocity and AirSpeed models as well.

The Impact of CVE-2022-36310

The vulnerability poses a significant risk as it allows unauthorized access to critical systems, potentially leading to complete control over the affected devices.

Technical Details of CVE-2022-36310

In this section, we delve into the specific technical details of the CVE-2022-36310 vulnerability.

Vulnerability Description

The vulnerability arises from NET-SNMP-EXTEND-MIB being enabled on the snmpd service in Airspan AirVelocity 1500 software prior to version 15.18.00.2511, facilitating unauthorized command execution as root on the eNodeB.

Affected Systems and Versions

The vulnerability affects Airspan's AirVelocity software versions earlier than 15.18.00.2511, specifically impacting devices with the NET-SNMP-EXTEND-MIB feature enabled.

Exploitation Mechanism

By leveraging SNMP write abilities, an attacker can exploit the vulnerability to execute arbitrary commands as the root user, gaining unauthorized control over the device.

Mitigation and Prevention

This section outlines the measures to mitigate and prevent exploitation of CVE-2022-36310.

Immediate Steps to Take

It is recommended to update the AirVelocity software to version 15.18.00.2511 or later to patch the vulnerability and disable the NET-SNMP-EXTEND-MIB feature to prevent unauthorized command execution.

Long-Term Security Practices

Implementing network segmentation, access controls, and regular security audits can enhance the overall security posture and reduce the risk of similar vulnerabilities being exploited.

Patching and Updates

Regularly monitor for software updates from Airspan and promptly apply patches to address known security vulnerabilities and mitigate potential risks.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now