Published:2024/04/16 Last Updated:2024/04/16
JVN#23835228
Proscend Communications M330-W and M330-W5 vulnerable to OS command injection
Overview
M330-W and M330-W5 provided by Proscend Communications Inc. contain an OS command injection vulnerability.
Products Affected
- M330-W versions prior to V1.11
- M330-W5 versions prior to V1.11
Description
M330-W and M330-W5 provided by Proscend Communications Inc. are LTE Industrial Cellular Routers. M330-W and M330-W5 contain an OS command injection vulnerability (CWE-78).
Impact
An arbitrary OS command may be executed by an attacker who has access to the product.
Solution
Update the firmware
The developer provides firmware which contains a fix for this vulnerability. Download and update the firmware.
Vendor Status
Vendor | Link |
Proscend Communications Inc. | Cellular-Router_v2.00_014B00012003872E_image.zip - Google Drive (Fixed firmware image) |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
CVSS v3
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score:
8.8
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
Credit
CYNEX Analysis Team of National Institute of Information and Communications Technology reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2022-36779 |
JVN iPedia |
JVNDB-2022-017175 |