Home / Advisories / KLCERT advisories / KLCERT-18-006: Kraftway-24F2XG Router Default Credentials

KLCERT-18-006: Kraftway-24F2XG Router Default Credentials

Kaspersky Lab publishes information on newly identified vulnerabilities in order to raise user awareness of the IT security threats detected. Kaspersky Lab does not make any guarantees in respect of information received from vendors of products in which vulnerabilities have been identified, which is included in the following sections of the advisory: Affected Products, Vendor Mitigation.

KL-IDS KLCERT-18-006
CVE-IDS CVE-2018-15350
Publication date 2018.08.17
Researcher Alexander Nochvay, Kaspersky Lab ICS CERT
Andrey Muravitsky, Kaspersky Lab ICS CERT
Description A remote attacker can get administrative privileges using default credentials.
Impact An unauthenticated attacker may be able to get privileged access to the router.
Severity
CVSS v3 Base Score: 9.8
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitability Remotely
Difficulty Low
User interaction None
Existence of exploit Unknown
Affected products
Affected products Kraftway-24F2XG Router firmware 3.5.30.1118
Mitigation
Vendor mitigation Update firmware: ver 3.5.47-315-gef7 and higher.
Timeline December 2017 – Vulnerabilities reported
December 2017 – First feedback from vendor
August 2018 – Vendor notified that patch is available