Learn about CVE-2023-23912 affecting EdgeRouters & USG devices, enabling remote code execution. Mitigation steps & version updates outlined.
This CVE record was published on February 9, 2023, by HackerOne. The vulnerability identified as CVE-2023-23912 affects EdgeRouters Version 2.0.9-hotfix.5 and earlier, as well as UniFi Security Gateways (USG) Version 4.4.56 and earlier.
Understanding CVE-2023-23912
This section will delve into the details of CVE-2023-23912, outlining the vulnerability, its impact, technical details, and mitigation strategies.
What is CVE-2023-23912?
CVE-2023-23912 is a vulnerability that allows a malicious actor connected to the WAN interface of affected EdgeRouters and USG devices to exploit a remote code execution vulnerability. This poses a significant security risk to impacted systems.
The Impact of CVE-2023-23912
The impact of this vulnerability is concerning as it enables unauthorized individuals to execute remote code on the affected devices. This could lead to a variety of malicious activities, including data breaches, unauthorized access, and system compromise.
Technical Details of CVE-2023-23912
In this section, we will explore the technical aspects of CVE-2023-23912, including vulnerability description, affected systems and versions, and the exploitation mechanism.
Vulnerability Description
The vulnerability in EdgeRouters and USG devices arises from their DHCPv6 prefix delegation settings being configured as dhcpv6-stateless or dhcpv6-stateful. This misconfiguration enables a direct connection to the WAN interface, creating a pathway for remote code execution.
Affected Systems and Versions
The affected systems include Ubiquiti EdgeRouters and USG devices. Specifically, EdgeRouter(s) Version 2.0.9-hotfix.5 and earlier, and USG(s) Version 4.4.56 and earlier are vulnerable. It is crucial to update EdgeRouter(s) to Version 2.0.9-hotfix.6 or later and USG(s) to Version 4.4.57 or later to mitigate this vulnerability.
Exploitation Mechanism
By exploiting this vulnerability, a threat actor needs to be directly connected to the WAN interface of the affected device. Through this access point, they can inject malicious code, potentially leading to the execution of unauthorized commands.
Mitigation and Prevention
This section focuses on the steps that organizations and individuals can take to mitigate the risks associated with CVE-2023-23912 and prevent exploitation.
Immediate Steps to Take
Immediate actions include updating EdgeRouters to Version 2.0.9-hotfix.6 or later and USG devices to Version 4.4.57 or later. Additionally, configuring DHCPv6 prefix delegation settings securely can help prevent unauthorized access to the WAN interface.
Long-Term Security Practices
Implementing network segmentation, access control measures, and regular security assessments can enhance the long-term security posture of EdgeRouters and USG devices. Security awareness training for users can also help in preventing social engineering attacks.
Patching and Updates
Regularly monitoring vendor security advisories and promptly applying software updates and patches is essential to address known vulnerabilities and enhance the overall security of networking devices like EdgeRouters and USG units.