Home / Advisories / KLCERT advisories / KLCERT-18-009: Kraftway-24F2XG Router Possible Remote Code Execution

KLCERT-18-009: Kraftway-24F2XG Router Possible Remote Code Execution

Kaspersky Lab publishes information on newly identified vulnerabilities in order to raise user awareness of the IT security threats detected. Kaspersky Lab does not make any guarantees in respect of information received from vendors of products in which vulnerabilities have been identified, which is included in the following sections of the advisory: Affected Products, Vendor Mitigation.

KL-IDS KLCERT-18-009
CVE-IDS CVE-2018-15353
Publication date 2018.08.17
Researcher Alexander Nochvay, Kaspersky Lab ICS CERT
Andrey Muravitsky, Kaspersky Lab ICS CERT
Description A Buffer Overflow exploited through web interface by remote attacker can cause remote code execution.
Impact A remote attacker can cause denial of service and possible remote code execution.
Severity
CVSS v3 Base Score: 9.8
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitability Remotely
Difficulty Low
User interaction None
Existence of exploit Unknown
Affected products
Affected products Kraftway-24F2XG Router firmware 3.5.30.1118
Mitigation
Vendor mitigation Update firmware: ver 3.5.47-315-gef7 and higher.
Timeline December 2017 – Vulnerabilities reported
December 2017 – First feedback from vendor
August 2018 – Vendor notified that patch is available